ISACA Exam Questions

Which of the following is BEST characterized by unauthorized modification of data before or during s

.Which of the following is BEST characterized by unauthorized modification of data before or during
systems data entry?

A.
Data diddling

B.
Skimming

C.
Data corruption

D.
Salami attack

Explanation:
Data diddling involves modifying data before or during systems data entry.