Filter interviews by
Clear (1)
I applied via Naukri.com and was interviewed in Mar 2022. There were 2 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Dec 2021. There were 3 interview rounds.
Risk assessment is conducted with a case study
posted on 30 Aug 2021
I applied via Naukri.com and was interviewed before Aug 2020. There was 1 interview round.
I was interviewed in Mar 2022.
Valuations can be of various types depending on the purpose and method used.
Asset-based valuation
Market-based valuation
Income-based valuation
Liquidation valuation
Replacement cost valuation
Equity represents ownership in a company, while enterprise value represents the total value of a company.
Equity is the residual interest in the assets of a company after liabilities are paid off
Enterprise value is the sum of equity, debt, minority interest, and preferred stock minus cash and cash equivalents
Equity is used to calculate metrics such as return on equity and price-to-book ratio
Enterprise value is used to c...
Comparable company analysis compares multiples of similar public companies while comparable transaction analysis compares multiples of similar M&A deals.
Comparable company analysis is based on multiples of similar public companies
Comparable transaction analysis is based on multiples of similar M&A deals
Comparable company analysis is more commonly used
Comparable transaction analysis is more accurate but harder to find d...
P2P process involves requisition, approval, purchase order, goods receipt, invoice receipt, and payment.
Requisition: Request for goods or services
Approval: Authorization of the requisition by appropriate personnel
Purchase Order: Formal document to the supplier specifying the details of the purchase
Goods Receipt: Verification of goods received matching the purchase order
Invoice Receipt: Receipt of invoice from the suppl
Key risks identified in internal audit experience
Lack of segregation of duties leading to potential fraud
Inadequate controls over financial reporting
Insufficient IT security measures
Non-compliance with regulations and policies
Weaknesses in inventory management
Ghost employees can be identified by cross-referencing payroll records with HR records and conducting regular audits.
Cross-reference payroll records with HR records to identify discrepancies
Conduct regular audits of employee information and payroll to detect any anomalies
Implement strong internal controls and segregation of duties to prevent ghost employees
Use biometric verification or time-tracking systems to ensure e...
You can perform procedures such as creating purchase orders, updating purchase orders, cancelling purchase orders, etc. from a PO dump.
Creating new purchase orders based on the information in the dump
Updating existing purchase orders with new information
Cancelling purchase orders that are no longer needed
Reviewing and analyzing purchase order data for insights
P2P Process involves requisition, approval, purchase order, goods receipt, invoice verification, and payment.
Requisition: Risk of incorrect or unauthorized requests leading to unnecessary purchases.
Approval: Risk of delays or errors in approval process causing delays in procurement.
Purchase Order: Risk of incorrect details or unauthorized purchases being made.
Goods Receipt: Risk of receiving damaged or incorrect goods,...
A ghost employee is a fictitious employee created by someone to embezzle funds from a company.
Ghost employees may have fake identities and bank accounts.
They may receive paychecks without actually working for the company.
To identify ghost employees, cross-check employee records with HR and payroll data.
Look for discrepancies in employee attendance, performance, and salary payments.
Conduct regular audits and reviews of
Perform various checks on purchase order data dump
Verify accuracy of vendor information
Check for duplicate PO numbers
Ensure correct pricing and quantities
Validate delivery dates
Confirm approval signatures
I applied via LinkedIn and was interviewed in Aug 2021. There were 3 interview rounds.
I applied via Referral and was interviewed before May 2020. There were 4 interview rounds.
Money laundering is the process of making illegally obtained money appear legal.
Money is moved through a series of transactions to conceal its origin
The money is often invested in legitimate businesses or assets
The launderer may use shell companies or offshore accounts to hide the money
Examples include drug trafficking, embezzlement, and tax evasion
Money laundering is a serious crime with severe penalties
I was interviewed in Aug 2020.
based on 1 review
Rating in categories
Senior Software Engineer
41
salaries
| ₹0 L/yr - ₹0 L/yr |
Manager
29
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Technical Consultant
29
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
28
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Consultant
22
salaries
| ₹0 L/yr - ₹0 L/yr |
Deloitte
PwC
KPMG India
Ernst & Young