ISACA Exam Questions

Which of the following is BEST characterized by unauthorized modification of data before or during s

Which of the following is BEST characterized by unauthorized modification of data before or during systems data entry?

A. Data diddling

B. Skimming

C. Data corruption

D. Salami attack

Explanation:

Data diddling involves modifying data before or during systems data entry.