Use of a smart card to authenticate remote servers remains MOST susceptible to the following attacks:
A.
 Malicious code on the local system
B.
 Shoulder surfing
C.
 Brute force certificate cracking
D.
 Distributed dictionary attacks
Explanation:
Once a user authenticates to a remote server, malicious code on the user’s workstation could then infect the
server.
                