ISACA Exam Questions

Which of the following is BEST characterized by unautho…

Which of the following is BEST characterized by unauthorized modification of data before or during
systems data entry?

A.
Data diddling

B.
Skimming

C.
Data corruption

D.
Salami attack

Explanation:
Data diddling involves modifying data before or during systems data entry.