PrepAway - Latest Free Exam Questions & Answers

Which of the following logical access exposures involves changing data before, or as it is entered into the co

Which of the following logical access exposures involves changing data before, or as it is entered
into the computer?

PrepAway - Latest Free Exam Questions & Answers

A.
Data diddling

B.
Salami techniques

C.
Trojan horses

D.
Viruses

Explanation:
This kind of attack involves altering the raw data just before it is processed by a
computer and then changing it back after the processing is completed. This kind of attack was
used in the past to steal small quantities of money and transfer them to the attackers account,
there are many other uses too. Trojan horses open ports without the user knowledge to permit
remote control and a Virus is a malicious piece of code that executed inside your computer.


Leave a Reply