ISACA Exam Questions

which of the following?

Authentication techniques for sending and receiving data between EDI systems is crucial to
prevent which of the following? Choose the BEST answer.

A.
Unsynchronized transactions

B.
Unauthorized transactions

C.
Inaccurate transactions

D.
Incomplete transactions

Explanation:
Authentication techniques for sending and receiving data between EDI systems are
crucial to prevent unauthorized transactions.