Which of the following best describes a Trojan horse?
A.
An application that creates a database of user-entered information
B.
An application that appears as if it is legitimate, but in fact is designed to defeat system security
C.
Software that is designed to compare user-entered information with the contents of the
Windows registry
D.
An application that enables a network connection designed to defeat legitimate authentication
measures
Explanation: