An IS auditor who has discovered unauthorized transactions during a review of EDI transactions is likely to recommend improving the:
A.
EDI trading partner agreements.
B.
physical controls for terminals.
C.
authentication techniques for sending and receiving messages.
D.
program change control procedures.
Explanation:
Authentication techniques for sending and receiving messages play a key role in minimizing exposure to unauthorized transactions. The EDI trading partner agreements would minimize exposure to legal issues.