ISACA Exam Questions

which of the following?

Authentication techniques for sending and receiving data between EDI systems is crucial to prevent
which of the following? Choose the BEST answer.

A.
Unsynchronized transactions

B.
Unauthorized transactions

C.
Inaccurate transactions

D.
Incomplete transactions

Explanation:
Authentication techniques for sending and receiving data between EDI systems are crucial to
prevent unauthorized transactions.