Use of a smart card to authenticate remote servers remains MOST susceptible to which of the following attacks?
A. Malicious code on the local system
B. Shoulder surfing
C. Brute force certificate cracking
D. Distributed dictionary attacks
Answer: A. Malicious code on the local system
Computer Science & Information Technology
You might also like to view...
You can attach at most two files to a contact record.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A(n) ____ is a structure in memory that contains records with one extra field for each record.
A. logic list B. linked list C. index D. array
Computer Science & Information Technology
Which Windows 7 Control Panel link is used to change the screensaver?
A) Sound B) Device Manager C) Personalization D) Power Options
Computer Science & Information Technology
In an exported SWF, the placed video and sound files must be uploaded separately to the host site.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology