Which of the following is BEST characterized by unauthorized modification of data before or during systems data entry?

Posted by: Pdfprep Category: CISA Tags: , ,

Which of the following is BEST characterized by unauthorized modification of data before or during systems data entry?
A . Data diddling
B . Skimming
C . Data corruption
D . Salami attack

Answer: A

Explanation:

Data diddling involves modifying data before or during systems data entry.

Leave a Reply

Your email address will not be published.