PrepAway - Latest Free Exam Questions & Answers

Which of the following logical access exposures involves changing data before, or as it is entered into the co

Which of the following logical access exposures involves changing data before, or as it is entered into
the computer?

PrepAway - Latest Free Exam Questions & Answers

A.
Data diddling

B.
Salami techniques

C.
Trojan horses

D.
Viruses

Explanation:
This kind of attack involves altering the raw data just before it is processed by a computer and then
changing it back after the processing is completed. This kind of attack was used in the past to steal
small quantities of money and transfer them to the attackers account, there are many other uses
too. Trojan horses open ports without the user knowledge to permit remote control and a Virus is a
malicious piece of code that executed inside your computer.

One Comment on “Which of the following logical access exposures involves changing data before, or as it is entered into the co


Leave a Reply