Use of a smart card to authenticate remote servers remains MOST susceptible to the following attacks:

A.
Malicious code on the local system
B.
Shoulder surfing
C.
Brute force certificate cracking
D.
Distributed dictionary attacks
Explanation:
Once a user authenticates to a remote server, malicious code on the user’s workstation could then infect the
server.