Question: need help with he following explain Question 6 4 pts The assertions of management related to financial statements include (1) the existence of assets and




need help with he following explain





Question 6 4 pts The assertions of management related to financial statements include (1) the existence of assets and transactions, (2) the completeness of the transactions reflected in the financial statements and related notes, (3) proper disclosure of all rights and obligations associated with assets and liabilities, (4) the reasonableness of the valuation of transactions and balances reflected in the financial statements, and (5) O Proper financial statement presentation and disclosure of the related notes O Certification of responsibility for the internal control environment O Formal attestation of any incidents of known fraud since prior audit O Internal auditor statement that they have not been coerced into overriding controlsElectronic evidence refers to any evidence captured 0 With the assistance of IT or MIS professionals working in collaboration with investigators 0 By examining the unused space on computer hard drives (assuming les have not been lost due to defragging) 0 Through the use of digital tools such as Road MASSter 3 and EnCase 0 By computers and electronic devices \fStudents (of forensic accounting and fraud examination) should understand that, with regard to digital evidence, only those with specialized training, experience, and appropriate professional certications should 0 Be involved in establishing materiality thresholds for IT audits 0 Use CAATTs to do \"black box\" or \"white box\" investigations 0 Initially handle digital evidence 0 Provide expert testimony Question 9 4 pts It may be possible to recover deleted emails if Q A program such as Privacy Guardian was used by the perpetrator O The service provider is named in the warrant (e.g., Google for gmail) 0 An MIS or IT professional uses the \"Defrag\" command while the computer is in safe mode 0 An email recovery tool is used prior to com paction/overwrite of data storage location Fraud examiners and auditors use data analysis software as , detecting a potential fraud in situations for which manual examination would prove extremely difficult or impossible. O A substitute for paper and pencil computations for O An internal control useful for O The ultimate system of red flags O Supplements to analytical work in
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
