Multiple Choice
Audit objectives in the electronic data interchange (EDI) environment include all of the following except
A) all EDI transactions are authorized
B) unauthorized trading partners cannot gain access to database records
C) a complete audit trail of EDI transactions is maintained
D) backup procedures are in place and functioning properly
Correct Answer:

Verified
Correct Answer:
Verified
Q17: All of the following are objectives of
Q18: Which method will render useless data captured
Q19: What is deep packet inspection?
Q20: In a computerized environment,the audit trail log
Q21: Hackers can disguise their message packets to
Q23: Audit trails in computerized systems are comprised
Q24: Computer viruses usually spread throughout the system
Q25: List three methods of controlling unauthorized access
Q26: What are biometric devices?
Q27: A firewall is a hardware partition designed