ISACA Exam Questions

Authentication techniques for sending and receiving data between EDI systems is crucial to prevent w

Authentication techniques for sending and receiving data between EDI systems is crucial to prevent which of the following?

A. Unsynchronized transactions

B. Unauthorized transactions

C. Inaccurate transactions

D. Incomplete transactions

Explanation:

Authentication techniques for sending and receiving data between EDI systems are crucial to prevent unauthorized transactions.