Which of the following logical access exposures INVOLVES CHANGING data before, or as it is entered into the computer?

Which of the following logical access exposures INVOLVES CHANGING data before, or as it is entered into the computer?
A .  Data diddling
B .  Salami techniques
C .  Trojan horses
D .  Viruses

Answer: A

Explanation: It involves changing data before , or as it is entered into the computer or in other words , it refers to the alteration of the existing data.

The other answers are incorrect because :

Salami techniques : A salami attack is the one in which an attacker commits several small crimes with the hope that the overall larger crime will go unnoticed.

Trojan horses: A Trojan Horse is a program that is disguised as another program. Viruses:A Virus is a small application , or a string of code , that infects applications.

Explanation: Shon Harris , AIO v3

Chapter – 11: Application and System Development, Page : 875-880

Chapter – 10: Law, Investigation and Ethics , Page : 758-759

Latest SSCP Dumps Valid Version with 1074 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments