Which of the following best describes a key logger?
A.
A n application that creates a database of user-entered information
B.
An application that appears as if it is legitimate, but is in fact designed to defeat system security
C.
Software that is designed to compare user-entered information with the contents of the
Windows registry
D.
An application that allows a network connection designed to defeat legitimate authentication
measures
Explanation: