Which of the following logical access exposures involves
changing data before, or as it is entered into the computer?
A. Data diddling
B. Trojan horse
C. Worm
D. Salami technique
Answer Posted / asif dawar
B. Trojan horses
Is This Answer Correct ? | 2 Yes | 9 No |
Post New Answer View All Answers