PdfPrep.com

Which of the following is BEST characterized by unauthorized modification of data before or during systems data entry?

Which of the following is BEST characterized by unauthorized modification of data before or during systems data entry?
A . Data diddling
B . Skimming
C . Data corruption
D . Salami attack

Answer: A

Explanation:

Data diddling involves modifying data before or during systems data entry.

Exit mobile version