Cryptic Hunt Set - 3
Across
- 5. A technique used in file systems to improve performance by delaying the writing of data to disk until it is necessary.
- 7. In cybersecurity, what is the term for a security mechanism that monitors and controls the flow of network traffic based on predetermined rules?
- 11. What cryptographic protocol secures email communication by providing authentication and encryption?
- 12. A term used to describe the state where two or more threads are attempting to modify shared data concurrently.
- 14. What term describes the process of ensuring that data transmitted across a network is secure from eavesdropping or tampering?
- 16. Which cipher involves using a series of rotating disks or cylinders to scramble the alphabet?
- 17. What type of attack targets the domain name system (DNS) to redirect users to malicious websites?
- 19. A tool used to automatically generate code from a given set of rules or templates.
- 20. Which type of attack involves capturing and analyzing network traffic to steal sensitive information, such as login credentials?
Down
- 1. A technique used in operating systems to protect critical sections of code by allowing only one thread to execute them at a time.
- 2. A technique used in file systems to ensure data integrity by recording changes to disk structures before making them.
- 3. What security measure restricts access to a network based on the physical address of a device?
- 4. A class that allows multiple threads to read from or write to a shared resource without interference.
- 6. What type of attack floods a network with excessive traffic to overwhelm its capacity?
- 8. A feature introduced in Java 8 that allows for the concise representation of anonymous functions or methods as instances of functional interfaces.
- 9. What is the name of the method for generating round keys from the original cryptographic key?
- 10. In the Vigenère cipher, what is the key used for encrypting the message?
- 13. A tool used for continuous integration and continuous delivery in Java projects.
- 15. A C library function used for finding the smallest integer that is greater than or equal to a floating-point number.
- 18. What is the name of the mathematical process used to reverse encryption?