Use of a smart card to authenticate remote servers remains MOST susceptible to which of the following attacks?
A. Malicious code on the local system
B. Shoulder surfing
C. Brute force certificate cracking
D. Distributed dictionary attacks
One Comment on “which of the following attacks?”
Vinita Sodomkasays:
Great website you have here but I was curious about if you knew of any message boards that cover the same topics discussed here? I’d really like to be a part of group where I can get responses from other experienced people that share the same interest. If you have any suggestions, please let me know. Bless you!
Great website you have here but I was curious about if you knew of any message boards that cover the same topics discussed here? I’d really like to be a part of group where I can get responses from other experienced people that share the same interest. If you have any suggestions, please let me know. Bless you!
http://commentperdredupoids.org//
0
0