Which of the following is an appropriate explanation of a zero-day attack?
a) In order to search for a vulnerable TCP/IP port that can be used as an entry point for
unauthorized intrusion, an attacker accesses a server while changing port numbers in
Among the descriptions (A through C) shown below, which of the following is the list
that contains only all the appropriate descriptions that are directly effective as a
measure against phishing?
A: When personal information is entered in a web site, it must be confirmed that the
web site uses an SSL connection, and also that the server certificate is valid.
B: When an e-mail urging the transmission of an ATM card number and a personal
identification number is received, its authenticity must be checked using several
methods just to be safe, even if it is from a trusted partner such as a bank of
account.
C: The login password of an e-commerce site must have a sufficient length and
complexity.
a) A, B b) A, B, C c) A, C d) B, C
numeric characters to such a term.