Tag Archives: contoh soal ujian

KPK Apresiasi Kemendagri Larang APBD untuk Olahraga Profesional


Komisi Pemberantasan Korupsi (KPK) mengapresiasi langkah Kementerian Dalam Negeri (Kemendagri) Republik Indonesia dalam menindaklanjuti hasil kajian tentang penggunaan APBD untuk olahraga. Melalui Peraturan Menteri Dalam Negeri (Permendagri) nomor 22 tahun 2011 tentang Pedoman Penyusunan Anggaran Pendapatan dan Belanja Daerah Tahun Anggaran 2012, Kemendagri melarang penggunaan APBD untuk olahraga profesional.

Dalam pasal 23 Permendagri tersebut dinyatakan bahwa pendanaan untuk organisasi cabang olahraga profesional tidak dianggarkan dalam APBD karena menjadi tanggung jawab induk organisasi cabang dan/atau organisasi profesional yang bersangkutan, ucap  Juru Bicara KPK, Johan Budi SP.

KPK sangat menyambut baik langkah ini, sekaligus juga berharap agar kementerian dan lembaga lain mau melakukan hal serupa dengan apa yang dilakukan oleh Kemendagri dalam hal pencegahan korupsi, lanjut Johan.

Kajian mengenai penggunaan dana APBD olahraga telah dipaparkan pada 5 April 2011 di hadapan Mendagri, Gamawan Fauzi; Menteri Pemuda dan Olahraga, Andi Mallarangeng; dan beberapa gubernur. Dalam kajian itu, KPK mengidentifikasi tiga temuan, yaitu dilanggarnya asas umum pengelolaan keuangan daerah pada pengelolaan dana APBD bagi klub sepak bola, adanya rangkap jabatan pejabat publik pada penyelenggaraan keolahragaan di daerah yang dapat menimbulkan konflik kepentingan, dan dilanggarnya prinsip transparansi dan akuntabilitas dalam pengelolaan hibah dari APBD.

Atas hasil kajian tersebut, lanjut Johan, KPK memberikan saran kepada Mendagri untuk membuat peraturan untuk menghentikan pengalokasian APBD bagi klub sepak bola mulai tahun anggaran 2012, termasuk pengaturan sanksinya.

KPK juga menyarankan Kemendagri untuk menginventarisasi pejabat publik yang melakukan rangkap jabatan pada kepengurusan KONI dan/atau kepengurusan klub sepak bola; dan mengeluarkan peraturan mengenai larangan pejabat publik untuk melakukan rangkap jabatan pada pengurusan KONI dan klub sepak bola, ucapnya. Selain itu, KPK meminta Mendagri menetapkan peraturan tentang pedoman pengelolaan hibah bagi pemerintah daerah yang di dalamnya sekurang-kurangnya mengatur tentang kriteria calon penerima hibah dan kewajiban untuk mengumumkan kepada publik nama penerima hibah dan besaran nilai hibahnya.

sumbernya dari sini.

1 Comment

Filed under Fraud and Corruption

Contoh Soal Sertifikasi CFE (1)


Lanjutan tulisan ini.

1. An insurance agent collects payment from a person for insurance, but doesn’t remit the check to the insurance company, keeping the payment. This is known as:

A. Equity fraud
B. Churning
C. Premium fraud
D. None of the above

Correct Answer (C)

In the instance of premium fraud, an agent collects the premium, but doesn’t remit the check to the insurance carrier.

2. __________ is the term used for including additional coverages in the insurance policy without the knowledge of the insured.

A. Twisting
B. Sliding
C. Churning
D. None of the above

Correct Answer (B)

Sliding is the term used for including additional coverages in the insurance policy without the knowledge of the insured. The extra charges are hidden in the total premium, and, since the insured is unaware of the coverage, few claims are ever filed. For example, motor club memberships, accidental death, and travel accident coverages can usually be slipped into the policy without the knowledge of the insured.

3. All of the following are responsibilities of a bankruptcy judge EXCEPT:
A. Hearing all cases regarding debtor and creditor rights
B. Conducting hearings and trials
C. Recommending reorganization plans to district judges
D. Awarding fees to professional

Correct Answer (C)

All bankruptcy cases are filed in the local district of the United States Bankruptcy Court. Bankruptcy judges hear all cases involving debtor and creditor rights, approve plans of reorganization, award fees to professionals and conduct hearings and trials.

4. Under provisions of the Fifth Amendment, a defendant may NOT be required to produce, before the time of trial, relevant evidence to the prosecution.
A. True
B. False

Correct Answer (B)

The government may require the defense to produce before trial all relevant documents, items, test results, and other evidence the defendant intends to offer as evidence at trial. This provision does not violate the defendant’s Fifth Amendment rights against self-incrimination, which protects him or her only from compelled production of testimonial statements.

5. Prior convictions of a defendant usually are NOT introduced at trial unless the defendant takes the stand.
A. True
B. False

Correct Answer (A)

If a defendant testifies in his or her own behalf in a criminal trial, he or she is subject to cross-examination, just like any other witness, and the prosecution may impeach his or her credibility by showing prior convictions. This usually is a death blow to the defense, and is the reason that many defendants do not testify.

6. In a complex organizational structure, it is less likely that misbehavior will be detected and punished than in a simple organizational structure.
A. True
B. False

Correct Answer (A)

Complex companies provide a structure that can foster misbehavior. They provide many settings where misconduct is possible. They isolate those settings in departments and in locations around a city, the country, or the world. The isolation, in turn, means that information about what one part of a company is doing may be unknown in another part. All this reduces the risk that misbehavior will be detected and punished. The larger a company grows, the more specialized its sub-units tend to become. An internally diversified company may have few employees who fully understand the detailed workings.

7. In the area of criminological theory, ____________ is the theory that tries to prevent a crime before it occurs by using the threat of criminal sanctions.
A. Punishment
B. Prevention
C. Deterrence
D. None of the above

Correct Answer (C)

As a strategy to control crime, deterrence is designed to detect law violations, determine who is responsible, and penalize offenders in order to deter future violations. Deterrence systems try to control the immediate behavior of individuals, not the long-term behaviors targeted by compliance systems. Deterrence theory assumes that humans are rational in their behavior patterns. Humans seek profit and pleasure while they try to avoid pain. Deterrence assumes that an individual’s propensity toward lawbreaking is in inverse proportion to the perceived probability of negative consequences.

10 Comments

Filed under Contoh Soal CFE

Contoh Soal Ujian CISA (1)


Lanjutan tulisan ini.

Contoh soal ujian CISA

1. The extent to which data will be collected during an IS audit should be determined based on the:
A. availability of critical and required information.
B. auditor’s familiarity with the circumstances.
C. auditee’s ability to find relevant evidence.
D. purpose and scope of the audit being done.

2. Which of the following ensures a sender’s authenticity and an e-mail’s confidentiality?
A. Encrypting the hash of the message with the sender’s private key and thereafter encrypting the hash of the message with the receiver’s public key
B. The sender digitally signing the message and thereafter encrypting the hash of the message with the sender’s private key
C. Encrypting the hash of the message with the sender’s private key and thereafter encrypting the message with the receiver’s public key
D. Encrypting the message with the sender’s private key and encrypting the message hash with the receiver’s public key

3. Which of the following is the GREATEST advantage of elliptic curve encryption over RSA encryption?
A. Computation speed
B. Ability to support digital signatures
C. Simpler key distribution
D. Greater strength for a given key length

4. Which of the following controls would provide the GREATEST assurance of database integrity?
A. Audit log procedures
B. Table link/reference checks
C. Query/table access time checks
D. Rollback and rollforward database features

5. A benefit of open system architecture is that it:
A. facilitates interoperability.
B. facilitates the integration of proprietary components.
C. will be a basis for volume discounts from equipment vendors.
D. allows for the achievement of more economies of scale for equipment.

Jawaban

1. ANSWER: D

NOTE: The extent to which data will be collected during an IS audit should be related directly to the scope and purpose of the audit. An audit with a narrow purpose and scope would result most likely in less data collection, than an audit with a wider purpose and scope. The scope of an IS audit should not be constrained by the ease of obtaining the information or by the auditor’s familiarity with the area being audited. Collecting all the required evidence is a required element of an IS audit, and the scope of the audit should not be limited by the auditee’s ability to find relevant evidence.

2. ANSWER: C

NOTE: To ensure authenticity and confidentiality, a message must be encrypted twice: first with the sender’s private key, and then with the receiver’s public key. The receiver can decrypt the message, thus ensuring confidentiality of the message. Thereafter, the decrypted message can be decrypted with the public key of the sender, ensuring authenticity of the message. Encrypting the message with the sender’s private key enables anyone to decrypt it.

3. ANSWER: A

NOTE: The main advantage of elliptic curve encryption over RSA encryption is its computation speed. This method was first independently suggested by Neal Koblitz and Victor S. Miller. Both encryption methods support digital signatures and are used for public key encryption and distribution. However, a stronger key per se does not necessarily guarantee better performance, but rather the actual algorithm employed.

4. ANSWER: B

NOTE: Performing table link/reference checks serves to detect table linking errors (such as completeness and accuracy of the contents of the database), and thus provides the greatest assurance of database integrity. Audit log procedures enable recording of all events that have been identified and help in tracing the events. However, they only point to the event and do not ensure completeness or accuracy of the database’s contents. Querying/monitoring table access time checks helps designers improve database performance, but not integrity. Rollback and rollforward database features ensure recovery from an abnormal disruption. They assure the integrity of the transaction that was being processed at the time of disruption, but do not provide assurance on the integrity of the contents of the database.

5. ANSWER: A

NOTE: Open systems are those for which suppliers provide components whose interfaces are defined by public standards, thus facilitating interoperability between systems made by different vendors. In contrast, closed system components are built to proprietary standards so that other suppliers’ systems cannot or will not interface with existing systems.

6 Comments

Filed under Contoh Soal CISA