Which of the following is BEST characterized by unauthorized modification of data before or during systems data entry?

.Which of the following is BEST characterized by unauthorized modification of data before or during
systems data entry?

.Which of the following is BEST characterized by unauthorized modification of data before or during
systems data entry?

A.
Data diddling

B.
Skimming

C.
Data corruption

D.
Salami attack

Explanation:
Data diddling involves modifying data before or during systems data entry.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

15 − 1 =