Which of the following best describes a Trojan horse?

Which of the following best describes a Trojan horse?

Which of the following best describes a Trojan horse?

A.
An application that creates a database of user-entered information

B.
An application that appears as if it is legitimate, but in fact is designed to defeat system security

C.
Software that is designed to compare user-entered information with the contents of the
Windows registry

D.
An application that enables a network connection designed to defeat legitimate authentication
measures

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *