ISACA Exam Questions

Which of the following is BEST characterized by unautho…

Which of the following is BEST characterized by unauthorized modification of data before or during systems
data entry?

A.
Data diddling

B.
Skimming

C.
Data corruption

D.
Salami attack

Explanation:
Data diddling involves modifying data before or during systems data entry.