Authentication techniques for sending and receiving data between EDI systems is crucial to prevent which of the following?
A. Unsynchronized transactions
B. Unauthorized transactions
C. Inaccurate transactions
D. Incomplete transactions
Explanation:
Authentication techniques for sending and receiving data between EDI systems are crucial to prevent unauthorized transactions.