Questions from Forensic Accounting


Q: What methods are used by insiders to commit computer fraud? What

What methods are used by insiders to commit computer fraud? What red flags might indicate that insider computer fraud is occurring?

See Answer

Q: What is meant by “hacking?”

What is meant by “hacking?”

See Answer

Q: A scientist has an unlimited water supply and two buckets, one

A scientist has an unlimited water supply and two buckets, one holds 4 gallons and the other holds 5 gallons. By using nothing but the buckets and water, how can he accurately measure 3 gallons of wat...

See Answer

Q: What is the discovery process and how does it work?

What is the discovery process and how does it work?

See Answer

Q: What are the three major types of negotiated remedies and how do

What are the three major types of negotiated remedies and how do they differ?

See Answer

Q: How did the Sarbanes-Oxley Act address corporate governance and public

How did the Sarbanes-Oxley Act address corporate governance and public accounting responsibilities?

See Answer

Q: What are the main components of the fraud risk assessment process?

What are the main components of the fraud risk assessment process?

See Answer

Q: How can conflicts of interest be prevented and detected?

How can conflicts of interest be prevented and detected?

See Answer

Q: What are the primary responsibilities of management?

What are the primary responsibilities of management?

See Answer

Q: Generally, how is the problem of management override and collusion addressed

Generally, how is the problem of management override and collusion addressed?

See Answer