An IS auditor who has discovered unauthorized transactions
during a review of EDI transactions is likely to recommend
improving the:

A. EDI trading partner agreements.

B. physical controls for terminals.

C. authentication techniques for sending and receiving messages.

D. program change control procedures.

Answer Posted / guest

Answer: C

Authentication techniques over sending and receiving
messages play a key role in minimizing exposure to
unauthorized transactions. The EDI trading partner
agreements would minimize exposure to legal issues.

Is This Answer Correct ?    7 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

2837


purchase orders issued to vendors have been authorized as per the authorization matrix

1088