Sarah, a cybersecurity analyst, is conducting a risk assessment on the use of smart cards in her organization. She is particularly concerned about a type of attack that deliberately induces malfunctions in the card. Which of the following weaknesses of smart cards is Sarah worried about? answer Eavesdropping Microprobing Software attacks Fault generation