Describe Adaptive Chosen Ciphertext Attacks (CCA2) and Non-Adaptive Chosen Ciphertext Attacks (CCA1). Provide examples or scenarios where these attacks could be employed.