All of the following techniques are used to validate electronic data interchange transactions except
A) value-added networks that compare passwords to a valid customer file before message transmission
B) prior to converting the message, the translation software of the receiving company can compare the password against a validation file in the firm's database
C) the recipient's application software can validate the password prior to processing
D) the recipient's application software can validate the password after the transaction has been processed
Correct Answer:
Verified
Q38: Audit trails cannot be used to
A)detect unauthorized
Q39: A software program that replicates itself in
Q40: Which of the following is considered an
Q41: In an electronic data interchange environment,customers routinely
Q42: When auditors examine and test the call-back
Q44: Many techniques exist to reduce the likelihood
Q45: In determining whether a system is adequately
Q46: All of the following are designed to
Q47: Audit objectives for communications controls include all
Q48: In an electronic data interchange environment,customers routinely
A)access
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents