Use of a smart card to authenticate remote servers remains MOST susceptible to which of the
following attacks?
A.
Malicious code on the local system
B.
Shoulder surfing
C.
Brute force certificate cracking
D.
Distributed dictionary attacks
Use of a smart card to authenticate remote servers remains MOST susceptible to which of the
following attacks?
Use of a smart card to authenticate remote servers remains MOST susceptible to which of the
following attacks?
A.
Malicious code on the local system
B.
Shoulder surfing
C.
Brute force certificate cracking
D.
Distributed dictionary attacks