Cryptic Hunt Set - 2

1234567891011121314151617181920
Across
  1. 6. A Java API for processing XML documents.
  2. 10. A term used to describe the state where two or more threads are attempting to modify shared data concurrently.
  3. 14. What is the name of the mathematical process used to reverse encryption?
  4. 15. A technique used in file systems to delay the actual writing of data to disk until it is necessary, often to optimize disk I/O performance.
  5. 16. Which security measure authenticates the identity of users and devices before granting them access to a network?
  6. 17. What cryptographic protocol secures email communication by providing authentication and encryption?
  7. 18. A tool used to automatically generate code from a given set of rules or templates.
  8. 19. A tool used for continuous integration and continuous delivery in Java projects.
  9. 20. What term describes the process of ensuring that data transmitted across a network is secure from eavesdropping or tampering?
Down
  1. 1. What is the term for a cipher that uses different keys for different parts of the message?
  2. 2. What security measure is used to verify the identity of users and devices before granting access to a network?
  3. 3. A technique used in virtual memory systems to reduce the overhead of page table lookups by storing frequently used page table entries in a cache.
  4. 4. A technique used in file systems to improve performance by delaying the writing of data to disk until it is necessary.
  5. 5. A mechanism used to improve performance in multi-threaded applications by reducing contention on shared resources.
  6. 7. In the Vigenère cipher, what is the key used for encrypting the message?
  7. 8. What is the name of the method for generating round keys from the original cryptographic key?
  8. 9. A class that allows multiple threads to read from or write to a shared resource without interference.
  9. 11. What cryptographic technique involves mixing plaintext with a pseudorandom stream of bits?
  10. 12. The meet-in-the-middle attack is often used to break what type of encryption scheme?
  11. 13. What type of attack targets the domain name system to redirect users to malicious websites?