Use of a smart card to authenticate remote servers remains MOST susceptible to which of the following attacks?
A. Malicious code on the local system
B. Shoulder surfing
C. Brute force certificate cracking
D. Distributed dictionary attacks
Answer: A. Malicious code on the local system
You might also like to view...
What logic does ACL processing use to determine a match?
A) Processing starts at the list bottom sequentially until a match is reached. B) Processing is started at the top and bottom in a parallel manner until a match is reached. C) Processing starts at the top and continues until a match is reached. D) Processing starts at the bottom and continues until a match is reached. E) The list is processed top to bottom, and the longest match is selected. F) The list is processed from bottom to top, and the longest match is selected.
What is the motherboard form factor?
A) The motherboard size B) The CPUs allowed on the motherboard C) The method of controlling memory modules D) The customer satisfaction rating over a 1-year period