9 CISA Electronic Data Interchange Questions Answer and Explanation

Free Exam Simulator

Question 1 - ID: 3411751
When evaluating the controls of an electronic data interchange (EDI) application, an IS auditor should Primarily be concerned with the risk of:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Foremost among the risk associated with electronic data interchange (EDI) is improper transaction authorization. Because the interaction with the parties is electronic, there is no inherent authentication. Improper authentication poses a serious risk of financial loss.
B
An excessive turnaround time is an inconvenience, but not a serious risk.
C
The integrity of EDI transactions is important, but not as significant as the risk of unauthorized transactions
D
The failure of the application interface is a risk, but not the most serious issue. Usually such a problem is temporary and easily fixed.
Question 2 - ID: 9812739
Which of the following procedures ensure completeness of inbound transaction in an EDI environment?
Select one
 
A.
B.
C.
D.
Answer and explanation:
provide supporting evidence but their findings are not complete to ascertain the above objective.
Question 3 - ID: 5212737
An IS auditor is reviewing the EDI process of an organization. Which of the following is the most concern area?
Select one
 
A.
B.
C.
D.
Answer and explanation:
In absence of a trading partner agreement, there could be uncertainty related to specific, legal liability. This is the area of most concern. Having a dedicated communication channel is a better control on EDI transactions.
Question 4 - ID: 1411730
Which of the following represents the GREATEST potential risk in an electronic data interchange (EDI) environment?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Transmission delays may terminate the process or hold the line until the normal time for processing has elapsed; however, there will be no loss of data.
B
Deletion or manipulation of transactions prior to, or after, establishment of application controls is an example of risk. Logging detects any alteration to the data, and the impact is not as great as that of unauthorized transactions.
C
Because the interaction between parties is electronic, there is no inherent authentication occurring; therefore, lack of transaction authorization is the greatest risk.
D
Loss or duplication of electronic data interchange transmissions is an example of risk, but because all transactions should be logged,.the impact is not as great as that of unauthorized transactions.
Question 5 - ID: 9811717
A company has recently upgraded its purchase system to incorporate electronic data interchange (EDI) transmissions. Which of the following controls should be implemented in the EDI interface to provide for efficient data mapping?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
One-for-one checking validates that transactions are accurate and complete but does not map data.
B
Manual recalculations are used to verify that the processing is correct but do not map data.
C
Key verification is used for encryption and protection of data but not for data mapping.
D
Acting as an audit trail for electronic data interchange transactions, functional acknowledgments are one of the main controls used in data mapping.
Question 6 - ID: 4912037
Which of the following should be included in a feasibility study for a project to implement an electronic data interchange process?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Encryption algorithms are too detailed for this phase. They would only be outlined, and any cost or performance implications shown.
B
The communications protocols must be included because there may be significant cost implications if new hardware and software are involved, and risk implications if the technology is new to the organization.
C
Internal control procedures are too detailed for this phase. They would only be outlined, and any cost or performance implications shown.
D
Third-party agreements are too detailed for this phase. They would only be outlined, and any cost or performance implications shown.
Question 7 - ID: 3611734
An appropriate control for ensuring the authenticity of orders received in an electronic data interchange system application is to:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Performing reasonableness checks on quantities ordered before placing orders is a control for ensuring the correctness of the organization's orders, not the authenticity of its customers' orders.
B
An electronic data interchange system is subject not only to the usual risk exposures of computer systems but also to those arising from the potential ineffectiveness of controls on the part of the trading partner and the third-party service provider, making authentication of users and messages a major security concern.
C
Encrypting sensitive messages is an appropriate step but does not prove authenticity of messages received.
D
Acknowledging the receipt of electronic orders with a confirming message is good practice but will not authenticate orders from customers.
Question 8 - ID: 3911715
An IS auditor who has discovered unauthorized transactions during a review of electronic data interchange (EDI) transactions is likely to recommend improving the:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Authentication techniques for sending and receiving messages play a key role in minimizing exposure to unauthorized transactions.
B
Physical control is important and may provide protection from unauthorized people accessing the system but does not provide protection from unauthorized transactions by authorized users.
C
The electronic data interchange trading partner agreements minimize exposure to legal issues but do not resolve the problem of unauthorized transactions.
D
Change control procedures do not resolve the issue of unauthorized transactions.
Question 9 - ID: 2112738
An IS auditor reviewed EDI process and noted use of appropriate encryption technique? Encryption helps in achieving which of the following objective?
Select one
 
A.
B.
C.
D.
Answer and explanation:
Internet encryption processes is placed to ensure authenticity, integrity, confidentiality and nonrepudiation of transactions.

Free Exam Simulator