What type of attacks occurs when a rogue application has been planted on an unsuspecting user’s
workstation?

A.
Physical attacks
B.
Logical attacks
C.
Trojan Horse attacks
D.
Social Engineering attacks
Explanation:
Trojan Horse attacks – This attack involves a rogue, Trojan horse application that has been planted
on an unsuspecting user’s workstation. The Trojan horse waits until the user submits a valid PIN from
a trusted application, thus enabling usage of the private key, and then asks the smartcard to digitally
sign some rogue data. The operation completes but the user never knows that their private key was
just used against their will.