All of the following techniques are used to validate electronic data interchange transactions except
A) value added networks can compare passwords to a valid customer file before message transmission
B) prior to converting the message, the translation software of the receiving company can compare the password against a validation file in the firm's database
C) the recipient's application software can validate the password prior to processing
D) the recipient's application software can validate the password after the transaction has been processed
Correct Answer:
Verified
Q44: Many techniques exist to reduce the likelihood
Q45: In determining whether a system is adequately
Q47: Audit objectives for communications controls include all
Q49: Which method is most likely to detect
Q53: In an electronic data interchange (EDI)environment,when the
Q54: Which of the following is not a
Q55: Audit objectives in the electronic data interchange
Q56: Which control will not reduce the likelihood
Q58: All of the following tests of controls
Q60: Firewalls are
A)special materials used to insulate computer
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents