Use of a smart card to authenticate remote servers remains MOST susceptible to which of the following attacks?

A. Malicious code on the local system
B. Shoulder surfing
C. Brute force certificate cracking
D. Distributed dictionary attacks

Answer: A. Malicious code on the local system

Computer Science & Information Technology

You might also like to view...

What logic does ACL processing use to determine a match?

A) Processing starts at the list bottom sequentially until a match is reached. B) Processing is started at the top and bottom in a parallel manner until a match is reached. C) Processing starts at the top and continues until a match is reached. D) Processing starts at the bottom and continues until a match is reached. E) The list is processed top to bottom, and the longest match is selected. F) The list is processed from bottom to top, and the longest match is selected.

Computer Science & Information Technology

What is the motherboard form factor?

A) The motherboard size B) The CPUs allowed on the motherboard C) The method of controlling memory modules D) The customer satisfaction rating over a 1-year period

Computer Science & Information Technology