Which of the following logical access exposures involves
changing data before, or as it is entered into the computer?

A. Data diddling

B. Trojan horse

C. Worm

D. Salami technique

Answer Posted / asif dawar

B. Trojan horses

Is This Answer Correct ?    2 Yes 9 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

purchase orders issued to vendors have been authorized as per the authorization matrix

1101


WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

2849