Which of the following logical access exposures involves
changing data before, or as it is entered into the computer?

A. Data diddling

B. Trojan horse

C. Worm

D. Salami technique

Answer Posted / guest

Answer: A

Data diddling involves changing data before, or as it is
entered into the computer. A trojan horse involves
unauthorized changes to a computer program. A worm is a
destructive program that destroys data. The salami technique
is a program modification that slices off small amounts of
money from a computerized transaction.

Is This Answer Correct ?    16 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

purchase orders issued to vendors have been authorized as per the authorization matrix

1095


WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

2847