CISA Certified Information Systems Auditor – Question2914

An IS auditor who has discovered unauthorized transactions during a review of EDI transactions is likely to recommend improving the:

A.
EDI trading partner agreements.
B. physical controls for terminals.
C. authentication techniques for sending and receiving messages.
D. program change control procedures.

Correct Answer: C

Explanation:

Explanation:
Authentication techniques for sending and receiving messages play a key role in minimizing exposure to unauthorized transactions. The EDI trading partner agreements would minimize exposure to legal issues.