CIW Exam Questions

Which of the following best describes a Trojan horse?

Which of the following best describes a Trojan horse?

A.
An application that creates a database of user-entered information

B.
An application that appears as if it is legitimate, but in fact is designed to defeat system security

C.
Software that is designed to compare user-entered information with the contents of the
Windows registry

D.
An application that enables a network connection designed to defeat legitimate authentication
measures

Explanation: