CISSP Question of the Day – 8-17-2016

Getting You Prepped for the CISSP Exam ...One Question at a Time!

Today’s CISSP question topic: Data manipulation

Peter, an accountant at Initech, has created a program that will take the fractions of pennies in accounting ledgers and deposit them into a bank account he set up under a fictitious name. What is the term used to describe the technique Peter is using to steal from the company?

  1. Data diddling
  2. Salami Slicing
  3. ACID transactions
  4. Time-of-Check/Time-of-Use
  5. Covert storage channel

Check Your Answer

  1. Salami Slicing

Supporting Links:

Co-workers, friends or colleagues studying for the CISSP exam, too? Share this question with them! Click an icon below to share to your preferred social media platform!
Posted in:
About the Author

Colin Weaver

Colin Weaver is co-owner and lead instructor at ITdojo, Inc., a network security and information assurance training center and consulting firm located in Virginia Beach, VA. His passion for technology, networks, and security has led him to become enthralled with the idea of IPv6 and its implementation. In this blog he will share with you glimpses of what he has learned and a hint at what you’ll learn in his classes.