An IS auditor who has discovered unauthorized transactions during a review of EDI transactions is
likely to recommend improving the:

A.
EDI trading partner agreements.
B.
physical controls for terminals.
C.
authentication techniques for sending and receiving messages.
D.
program change control procedures.
Explanation:
Authentication techniques for sending and receiving messages play a key role in minimizing
exposure to unauthorized transactions. The EDI trading partner agreements would minimize
exposure to legal issues.