Cryptic Hunt Set - 1
Across
- 3. What term describes the process of ensuring that data transmitted across a network is secure from eavesdropping or tampering?
- 5. A class that allows multiple threads to read from or write to a shared resource without interference.
- 7. A synchronization primitive used to synchronize threads by allowing them to take turns accessing a resource.
- 9. In cybersecurity, what is the term for a security mechanism that monitors and controls the flow of network traffic based on predetermined rules?
- 11. A term used to describe the state where two or more threads are attempting to modify shared data concurrently.
- 12. Which technique aims to recover the original message from encrypted or encoded data without knowledge of the key?
- 16. Which cipher involves using a series of rotating disks or cylinders to scramble the alphabet?
- 17. A technique used in file systems to ensure data integrity by recording changes to disk structure before making them.
- 18. What type of attack floods a network with excessive traffic to overwhelm its capacity?
- 19. What is the name of the mathematical process used to reverse encryption?
- 20. A C library function used for finding the smallest integer that is greater than or equal to a floating-point number.
Down
- 1. What type of attack targets the domain name system to redirect users to malicious websites?
- 2. A technique used in file systems to delay the actual writing of data to disk until it is necessary, often to optimize disk I/O performance.
- 4. A tool used to automatically generate code from a given set of rules or templates.
- 6. An interface in the java.util.function package that represents a function that acceptstwo arguments and produces a result.
- 8. A type of reference in Java that prevents the referenced object from being garbagecollected until the reference itself is reachable.
- 10. What security measure restricts access to a network based on the physical address of a
- 13. In which cipher method does the key schedule determine the round keys used in the encryption algorithm?
- 14. Which type of attack involves capturing and analyzing network traffic to steal sensitive information, such as login credentials?
- 15. In which cipher does each letter in the plaintext get replaced by a corresponding letter some fixed number of positions down the alphabet?