Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CAMS Questions and Answers

Question # 6

An organization is developing a comprehensive anti-money laundering (AML) framework.

Which of the following statements best describes the relationship between AML policies and procedures?

A.

Policies are broad guidelines. Procedures are detailed instructions for specific processes. Only procedures are mandatory for knowledge and adherence.

B.

Policies define the principles of an organization and influence the drafting of procedures. Procedures are detailed instructions for specific processes.

C.

Policies are detailed instructions for specific processes. Procedures are an overarching framework. Neither policies nor procedures are mandatory for knowledge and adherence.

D.

Policies are detailed instructions for specific processes. Procedures are an overarching framework. Both policies and procedures are mandatory for knowledge and adherence.

Full Access
Question # 7

Which risks are specifically associated with the misuse of gaming accounts in financial crime? (Choose three.)

A.

Using gaming accounts to transfer illicit funds between players undetected

B.

Structuring transactions to avoid reporting thresholds by keeping them under certain limits

C.

Providing false personal information to evade regulatory oversight

D.

Ensuring identity verification is completed prior to the onboarding of new customers

E.

Investing all gaming winnings into high-risk stocks to conceal funds

Full Access
Question # 8

A compliance manager at a virtual asset service provider (VASP) is evaluating its business and its impact on AML policies. Which of the following features of the VASP's business would be of greatest concern? (Select Four.)

A.

Allowing clients lo transact anonymity-enhanced tokens

B.

Onboardlng of clients who are residents abroad. Including those with politically exposed person (PEP) status

C.

Enabling transfer of tokens from one blockchain to another

D.

Offering services to VASPs established in jurisdictions that are not FATF compliant

E.

Operating a network of crypto ATMs charging high fees

F.

Lack of adequate IP address tracking capabilities

Full Access
Question # 9

Which of the following are part of a risk-based approach? (Select Three.)

A.

Determining detailed risk profiles for customers based on their activities and relationships

B.

Focusing monitoring primarily on previously flagged customers while using standard controls for others

C.

Choosing and applying effective controls that align with the identified risk levels

D.

Performing a comprehensive risk assessment to identify customer, transaction, and geographic risks

E.

Allocating resources equally across all customer segments to ensure fairness

Full Access
Question # 10

When deciding on the fuzzy matching threshold for sanctions screening, consideration should be given to:

A.

the operational burden of dealing with potential matches.

B.

the value of fines for non-compliance.

C.

the experience of the team dealing with potential matches.

D.

whether the data to be screened is reliable and verified.

Full Access
Question # 11

Risks associated with real estate transactions include: (Choose two.)

A.

cross-border purchases

B.

purchases in the name of a natural person

C.

paying true market price for a property

D.

non-financed purchases

Full Access
Question # 12

Which of the options below is an indicator of potential insider activity that may warrant escalation For further investigation?

A.

A relationship manager advocates for overriding the results of the company's client risk rating model that resulted in a client's high-risk rating.

B.

An If employee shares information about a firm's risk management framework with employees of other firms at an industry convention.

C.

An investigator does not complete the automated transaction monitoring system alerts assigned to them before the time required by company procedures.

D.

A relationship manager makes an exception to company policy and proceeds with onboarding a customer without documenting a passport for customer identification

Full Access
Question # 13

Which of the following scenarios describe common risk indicators of money laundering faced by operators of legitimate money services businesses (MSBs)? (Select Three.)

A.

A customer changes multiple high-denomination notes to low-denomination notes.

B.

A customer conducts cash transactions using multiple branches of the MSB on the same day.

C.

A customer has a family link to the destination of a money transfer

D.

A customer sends and receives money transfers in equal amounts at or about the same time.

E.

A customer only wants to deal with a particular employee in the MSB.

Full Access
Question # 14

A bank is preparing for a regulatory exam after a previous regulatory exam identified weaknesses in the bank's AML program. Since the last exam, the bank has improved the written AML program, hired an experienced AML compliance officer, and has taken actions to demonstrate a strong culture of compliance. The bank is now focused on getting through their transaction monitoring case backlog and completing enhancements to its sanctions screening program.

Which of the following are correct? (Select Two.)

A.

The bank is likely to face secondary sanctions from global financial institutions despite addressing many of the previous concerns.

B.

The bank may face civil or criminal penalties if it is unable to demonstrate sustained improvement in addressing the previous concerns.

C.

The bank may face the risk of regulatory orders to remediate its AML program despite addressing many of the previous concerns.

D.

The bank is protected from reputational risk arising from any regulatory action because regulatory orders must remain confidential.

E.

The regulatory agency may require the bank's board of directors to publicly share the actions taken to address the previous concerns in order to limit its reputational risk.

Full Access
Question # 15

Which of the following are common indicators of possible money laundering within the securities industry? (Select Two.)

A.

Receiving securities into an existing brokerage account following the death of a spouse

B.

Allowing fixed income securities to mature

C.

Using brokerage accounts like deposit accounts

D.

Engaging in transactions involving nominees or third parties

Full Access
Question # 16

Which of the following are benefits of the latest KYC solutions, including but not limited to digital onboarding, eKYC, digital identity, facial recognition, liveness checks, biometrics, and geolocation? (Choose three.)

A.

Guaranteeing 100% accuracy in regulatory compliance across all jurisdictions

B.

Improving customer satisfaction by offering personalized recommendations

C.

Reducing identity theft effectively

D.

Providing reliable customer authentication to enhance trust

E.

Decreasing the time required for customer authentication

Full Access
Question # 17

An oil exploration company based in France does business with oil refineries in Iran, which is subject to comprehensive Office of Foreign Assets Control (OFAC) sanctions.

What type of OFAC sanctions should be imposed against the French company?

A.

List-based

B.

Secondary

C.

Country-based

D.

Sectoral

Full Access
Question # 18

A financial institution's (FI's) policy is to apply enhanced due diligence (EDD) for every new client to ensure the effectiveness of the program.

How should a consultant advise the FI's management team?

A.

Suggest the FI needs to implement a risk-based approach for EDD.

B.

Suggest the management team select the clients that are chosen for EDD.

C.

Suggest the management team ask the regulator for advice on EDD measures.

D.

Suggest EDD for 50% of the clients is appropriate.

Full Access
Question # 19

Which of the following businesses require enhanced or additional scenarios for identifying anomalous transactions? (Select Two.)

A.

Companies operating in cash intense businesses not subject to licensing requirement

B.

Companies operating hospitals and health-care services

C.

Companies operating in cash intense businesses subject to licensing requirement

D.

Companies producing pharmaceutical products and medical devices, companies active in the mining industry

E.

Companies operating retail shops countrywide

Full Access
Question # 20

An organization is developing a comprehensive anti-money laundering (AML) framework.

Which of the following statements best describes the relationship between AML policies and procedures?

A.

Policies are detailed instructions for specific processes. Procedures are an overarching framework. Neither policies nor procedures are mandatory for knowledge and adherence

B.

Policies are broad guidelines. Procedures are detailed Instructions for specific processes. Only procedures are mandatory for knowledge and adherence.

C.

Policies are detailed instructions for specific processes Procedures are an overarching framework Both policies and procedures are mandatory for knowledge and adherence.

D.

Policies define the principles of an organization and influence the drafting of procedures. Procedures are detailed instructions for specific processes.

Full Access
Question # 21

Which role within private banking has the best placement to identify and report money laundering risk?

A.

Investment advisor

B.

Relationship manager

C.

Operations manager

D.

Compliance officer

Full Access
Question # 22

In the process of mutual evaluations and subsequent follow-ups used by the Financial Action Task Force (FATF) to assess the quality of various jurisdictions' AML controls, the FATF:

A.

imposes economic sanctions on jurisdictions with lax AML controls to force them to strengthen their controls.

B.

conducts on-site inspections of financial institutions in jurisdictions with lax AML controls to identify deficiencies and recommend improvements.

C.

publishes annual reports ranking all member jurisdictions based on their self-assessment of AML controls.

D.

conducts a peer review process whereby member countries assess the AML controls of other jurisdictions and provide recommendations for improvement.

Full Access
Question # 23

The first line of defense is responsible for:

A.

collecting complete customer information.

B.

ongoing screening of customers.

C.

suspicious activity and sanctions reporting.

D.

evaluating the effectiveness of compliance controls.

Full Access
Question # 24

Which services provided by an accounting firm could be considered as higher risk from a financial crime perspective? (Choose three.)

A.

Forming a trust on behalf of a customer with a complex setup and acting as a nominee director

B.

Auditing a firm that provides payroll software to large corporate customers

C.

Preparing financial statements for a listed or a privately owned firm

D.

Providing tax advice to an international customer hoping to move their assets out of their home country

E.

Assisting an offshore corporation from a jurisdiction with no available beneficial owner information to buy property in the UK

Full Access
Question # 25

Which of the following is a benefit of an institution implementing machine learning to identify suspicious transactions?

A.

Adaptable to new AFC typologies through continuous model training

B.

Completely unbiased and without error through continuous model training

C.

More consistent and reliable detection outcomes

D.

Transparent and easy to explain algorithms for regulator and compliance purposes

Full Access
Question # 26

The law enforcement agency (LEA) of a foreign jurisdiction contacts a financial institution (FI) regarding one of the FI's clients. The LEA advises that the client is currently wanted for prosecution as a result of a series of human trafficking charges.

What should the FI do? (Select Two.)

A.

Inform local LEA and regulator of the request for awareness

B.

Close the client's accounts immediately to avoid any undue risk

C.

Review the client's activity, determine if suspicious activity exists, and report accordingly

D.

Advise the LEA that the government needs to be contacted for extradition

E.

Comply immediately with the foreign jurisdiction and turn over all client information

Full Access
Question # 27

Which operational situation might indicate that money laundering is occurring at or through a deposit-taking financial institution?

A.

The institution has observed an increase in customer demand for large-denomination banknotes.

B.

The institution maintains a sequentially numbered log of the monetary instruments it sells.

C.

The institution has observed a reduced settlement time in the transaction services that support the rapid movement or remittance of funds.

D.

The institution has observed an increase in the adoption of its digital products and services.

Full Access
Question # 28

According to the Egmont Group, which benefits do public-private partnerships (PPPs) provide to Financial Intelligence Units (FIUs)? (Select Three.)

A.

Helping overcome data protection and information sharing limitations

B.

Enhancing the quality of reporting and additional informational input

C.

Helping to alleviate the financial cost burden on law enforcement

D.

Helping to design common approaches and identify desired deliverables

E.

Offering flexibility, agility, and opportunities to adjust to the ML/TF threat environment

Full Access
Question # 29

Which benefits are most commonly associated with transitioning from a rules-based approach to artificial intelligence (AI) and machine learning-based tools in transaction monitoring? (Choose three.)

A.

Reduction in the number of false positives in long term

B.

Complete automation of compliance processes

C.

Elimination of the need for human oversight

D.

Increased flexibility in adapting to changing financial crime risks

E.

Enhanced ability to detect emerging patterns and anomalies

Full Access
Question # 30

What key element contributes to the effectiveness of AML training programs'?

A.

In-person training sessions

B.

Comprehensive curriculum delivered by senior management

C.

Comprehensive content with engaging delivery methods

D.

Generalized content designed to apply to a broad audience

Full Access
Question # 31

A risk-based approach (RBA) to anti-financial crimes (AFC) involves understanding and managing risks by:

A.

applying uniform controls to all customers, regardless of their risk profile

B.

allocating resources and implementing controls based on the level of identified risks

C.

prioritizing regulatory compliance over customer experience and operational efficiency

D.

relying on automated systems to detect and mitigate AFC risks

Full Access
Question # 32

Which of the following is a critical consideration for private sector firms when sharing data and intelligence to combat financial crime?

A.

The preference of upper management regarding which teams should participate in the data-sharing initiative

B.

The cost of the data-sharing system and whether it its within the existing IT budget

C.

The potential return on investment (ROI) from the data shared versus the financial crime prevention effort

D.

Ensuring that the shared data complies with applicable data protection regulations while maintaining the integrity and accuracy of the information

Full Access
Question # 33

Assessing the money laundering risk related to a product within the financial sector includes assessing the: (Select Two.)

A.

governance arrangements

B.

complexity of the products

C.

results of the last audit

D.

financial status of the business

Full Access
Question # 34

A bank received a subpoena regarding one of its clients. The financial intelligence unit of the bank should review the subpoena and:

A.

Close the client's account by informing the client of the subpoena.

B.

Perform a transaction review and respond fully to the subpoena.

C.

File a suspicious activity report (SAR), including the receipt of the subpoena in the SAR narrative.

D.

Adjust the client's risk score and close the case.

Full Access
Question # 35

The primary objectives of the United Nations in developing sanctions regimes include: (Select Three.)

A.

to force developing nations to adopt liberal or substantive democracies.

B.

to support governments and regimes in the peaceful resolution of conflict.

C.

to punish governments for having weak financial crime controls.

D.

to deter non-democratic and non-constitutional changes within countries.

E.

to support the protection of human rights.

Full Access
Question # 36

Cryptocurrency-related technologies that can be exploited by money launderers include: (Select Two.)

A.

generative copilots.

B.

small language models.

C.

privacy coins.

D.

crypto-mixers.

Full Access
Question # 37

Which of the following programs would most likely be considered part of an effective supervision regime for a regulator?

A.

Onsite and offsite reviews, cooperating on an international basis with access to a range of sanctions and outreach

B.

Onsite and offsite reviews, cooperating on an international and domestic basis with access to a range of sanctions and outreach

C.

Offsite reviews, cooperating on a domestic basis with access to a range of sanctions and outreach

D.

Onsite reviews, cooperating on an international and domestic basis with outreach and access to a range of sanctions

Full Access
Question # 38

Who bears the ultimate responsibility for approving a financial institution's relationship with a politically exposed person?

A.

KYC analyst

B.

Senior management

C.

Relationship manager

D.

Enhanced due diligence compliance officer

Full Access
Question # 39

What is the primary purpose of anti-bribery and corruption regulations?

A.

To prohibit the payment of anything of value by persons or entities to government officials or employees of state-owned enterprises to obtain an improper business advantage

B.

To prohibit the conversion of illegally obtained money into legal money by senior government figures

C.

To protect against election interference by corrupt foreign adversaries facilitated by illicit funds

D.

To protect against the use of illegal means by senior political figures to avoid paying taxes

Full Access
Question # 40

There are three types of factors that can be used to authenticate someone ownership, knowledge, and inherent factors.

Which of the following factors falls under inherent factors?

A.

Challenge-response

B.

Fingerprint

C.

Security token

D.

Passphrase

Full Access
Question # 41

Which changes at a financial institution (FI) should trigger an enterprise-wide reassessment of its inherent AML risk exposure? (Select Three.)

A.

Introduction of new products or services

B.

Mergers or acquisitions

C.

Restructuring of the FI's risk and compliance functions

D.

Use of new technologies for delivering existing products

E.

Changes in the individuals overseeing the FI's product lines and sales strategies

Full Access
Question # 42

An institution is looking to alter an existing threshold-based monitoring scenario because it is generating too many alerts that do not yield suspicious activity reports.

Documentation submitted to the relevant committee for supporting this proposal should include details on: (Choose three.)

A.

evidence that the increased residual risk arising from the change is within the bank's risk appetite.

B.

approval by money-laundering reporting officer for the proposal.

C.

how many resources are spent on the less productive lower threshold and the associated costs.

D.

the number of cases that will not be filed and the resources that can be freed up for other tasks.

E.

minutes of meeting held with the regulator where agreement was obtained that the higher threshold was justified.

F.

historical analysis proving that the current scenario generates a disproportionate number of false positives.

Full Access
Question # 43

Which of the below would be relevant money laundering red flags for life insurance companies? (Select Two.)

A.

Paying premium several years in advance and terminating early for a refund

B.

Natural persons having more than one insurance policy

C.

High-premium life insurances that provide high payouts

D.

Regularly switching policies and accepting penalties

E.

Beneficiary payouts to elderly people

Full Access
Question # 44

Which customer actions are red flags for virtual currency peer-to-peer transactions? (Choose two.)

A.

A customer receives funds from a popular decentralized mixer

B.

A customer uses funds from their monthly income to purchase virtual currency

C.

A customer makes a transaction on the blockchain that their traditional financial institution is unaware of

D.

A customer receives multiple wires from different sources and uses those funds to purchase virtual currency

Full Access
Question # 45

An AML compliance officer for a large bank has recently received an internal audit report on the private banking unit. The report revealed that the unit staff were not following risk-based due diligence procedures, so that the unit was not operating effectively.

Which immediate actions should the AML compliance officer consider to address these findings? (Select Two.)

Management Should implement a quality assurance program in the private banking unit

A.

Private bankers should receive training on AML procedures.

B.

All employees should receive refresher AML training.

C.

The board should review and approve a revised AML policy to change customer due diligence requirements in private banking.

D.

The legal department should conduct a review to assess potential legal consequences.

Full Access
Question # 46

Which statement best describes a key money laundering risk associated with virtual asset service providers (VASPs), cryptoassets, and related products?

A.

Cryptoassets can be transferred across borders quickly, but the volatility of their value still makes them less attractive for money laundering compared to traditional assets

B.

Mandatory reporting requirements have been implemented for certain types of crypto transactions, but gaps in regulation and enforcement still leave room for money laundering activities.

C.

The transparency of blockchain technology helps law enforcement trace transactions, but it can also provide criminals with ways to obscure their financial activities through complex layering techniques.

D.

The pseudonymous nature of transactions allows criminals to hide their identities while transferring large sums of money globally, making it difficult to trace the ultimate beneficial owner.

Full Access
Question # 47

The manager of a bank's KYC team discovers that a high-risk customer's activity was not reviewed last quarter as the bank's internal schedule required.

What should the KYC team manager do?

A.

Submit a referral to file a suspicious activity report (SAR)

B.

Evaluate the KYC review process to understand why the review did not occur as required and take corrective action as necessary

C.

Contact the customer's relationship manager to suspend account access until the periodic KYC review is completed

D.

Remove the customer from the bank's high-risk list

Full Access
Question # 48

Which strategies are most effective for prioritizing resources within an anti-financial crime (AFC) program using a risk-based approach (RBA)? (Choose two.)

A.

Prioritizing resources towards lower-risk areas to reduce workload

B.

Regularly reassessing risks to adjust resource allocation

C.

Allocating more resources to areas with higher financial crime risk

D.

Providing equal resources to all departments to maintain consistency

E.

Using a fixed resource allocation plan without adjustments

Full Access
Question # 49

An adequate organizational policy is: (Choose two.)

A.

up to date and reflects all relevant regulatory developments

B.

signed off by the board of directors and regulators

C.

approved by the clients and third parties

D.

clearly communicated and understood by staff

Full Access
Question # 50

Which techniques are most commonly used in a rules-based approach to transaction monitoring for detecting suspicious activities? (Choose two.)

A.

Using predefined rules to flag specific transaction patterns

B.

Randomly flagging transactions for further investigation

C.

Statistical tuning of monitoring scenarios to improve accuracy

D.

Using advanced machine learning models to detect outliers

E.

Setting transaction thresholds for automated alerts

Full Access
Question # 51

A financial institution's transaction monitoring system flags an unusually high volume of international wire transfers originating from a small business account. The transfers are being sent to multiple jurisdictions known for limited regulatory oversight. Additionally, an employee reports suspicious behavior from the account holder during an in-person visit, where they requested a large cash withdrawal without providing a clear business justification. As part of the investigation, the compliance team must assess whether this activity is suspicious and determine the appropriate next steps.

Which of the following steps should be taken first in the investigation process to properly gather information and assess whether the transactions are suspicious?

A.

Review the transaction history of the account to identify patterns, including the frequency, destination, and purpose of the wire transfers

B.

Notify senior management and suggest account closure due to potential risks

C.

Immediately file a suspicious activity report (SAR) based on the employee's report of suspicious behavior

D.

Contact the customer directly to ask for clarification on the reason for the large cash withdrawal

Full Access
Question # 52

A financial institution is exploring automation to assist investigators in reviewing flagged transactions. Currently, investigators spend a significant amount of time gathering data from multiple sources.

Which of the following automation features would be most effective in improving investigator efficiency?

A.

Pre-populated templates for SAR filing

B.

Integration of open-source tools to gather real-time intelligence

C.

Automated case prioritization based on risk scoring

D.

AI-powered dashboards summarizing flagged transactions

Full Access
Question # 53

In a large US bank, an individual leads a team in charge of overseeing the governance and effectiveness of the bank's transaction monitoring approach.

Which strategies should the team implement? (Select Two.)

A.

Periodic and ad hoc cooperation with the legal team to appropriately investigate and monitor the transactions of subjects of subpoenas or government inquiries

B.

Periodic review of client profiles to ensure that the most up-to-date information is on file for high-risk clients in line with the bank's internal policies and procedures

C.

Periodic review of suspicious activity reports (SARs) filed with FinCEN to determine whether any should be withdrawn

D.

Periodic review of the transaction monitoring scenarios and their productivity to ensure that appropriate AML typologies are reflected

Full Access
Question # 54

Criminals may misuse financial statements prepared by accountants to hide illicit assets.

Which of the following scenarios poses the greatest risk of financial statement manipulation by criminals?

A.

A lack of professional body oversight or required use of accounting and auditing standards in the country of incorporation of the entity

B.

Criminals posing as individuals seeking financial advice to place assets out of reach to avoid future liabilities

C.

Incomplete records being provided during bookkeeping, making them difficult to audit

D.

Accountants being used as intermediaries to introduce criminals to financial institutions

Full Access
Question # 55

The primary objectives of the United Nations in developing sanctions regimes include: (Choose three.)

A.

to force developing nations to adopt liberal or substantive democracies.

B.

to support governments and regimes in the peaceful resolution of conflict.

C.

to punish governments for having weak financial crime controls.

D.

to deter non-democratic and non-constitutional changes within countries.

E.

to support the protection of human rights.

Full Access
Question # 56

A global financial institution is conducting a comprehensive review of its due diligence processes to strengthen its defenses against financial crime. Recent incidents have highlighted vulnerabilities related to employee misconduct, including unauthorized transactions and sharing of sensitive customer information. Additionally, the FI has faced issues with third-party vendors who failed to meet compliance standards, leading to increased regulatory scrutiny.

Which of the following measures would be most effective in addressing the bank's due diligence needs for employees, vendors, and third parties to mitigate insider threats and ensure compliance with AML regulations?

A.

Relying on self-reported compliance certifications from vendors and employees to confirm adherence to AML standards on a periodic basis

B.

Establishing a surveillance program for employees, vendors, and third parties, including periodic risk assessments, access controls, and regular reviews of their compliance with AML policies

C.

Implementing background checks for employees and vendors prior to onboarding or the start of engagement to identify any red flags

D.

Limiting the number of vendors and third parties in high-risk jurisdictions in order to reduce exposure to compliance risks

Full Access
Question # 57

A compliance officer at a financial institution has completed an investigation into a high-risk customer's activities and determined that there are strong indications of money laundering. The compliance officer has documented their findings and is ready to recommend offboarding the customer. However, the relationship manager responsible for the customer is resistant to the idea, citing the customer’s significant revenue contribution to the institution.

What should the compliance officer do next to ensure the appropriate escalation and decision-making process is followed?

A.

Escalate the matter to the institution's high-risk client committee, presenting the investigation findings and recommending offboarding while also acknowledging the relationship manager's concerns

B.

Proceed with offboarding the customer unilaterally based on their investigation findings and anti-money laundering (AML) concerns

C.

Attempt to persuade the relationship manager to agree with the offboarding recommendation by highlighting the potential reputational and regulatory risks associated with maintaining the relationship

D.

Delay the offboarding decision and continue monitoring the customer's activities, waiting for further evidence to solidify the case for termination

Full Access
Question # 58

The primary roles of a Country's Financial Intelligence Unit (FIU) include: (Select Two.)

A.

collaborating with law enforcement agencies, financial institutions, and other stakeholders to detect and prevent Illicit financial activities.

B.

conducting examinations of financial institutions to ensure compliance with anti-money laundering regulations.

C.

engaging in providing financial services, including banking and investment activities, to the public and private sectors

D.

facilitating the exchange of information between the public and private sectors.

E.

enacting legislation regarding the operations of financial institutions.

Full Access
Question # 59

When assessing and managing money laundering risks while operating in foreign jurisdictions different from that of the head office, an effective AML monitoring program should:

A.

Be consistent with the head office audits

B.

Be tailored to the higher of standards between the jurisdictions.

C.

Conform to the foreign jurisdiction policies to align with the head office policies.

D.

Provide all foreign jurisdiction reports to the head office for approval.

Full Access
Question # 60

Section 319(a) of the USA PATRIOT Act:

A.

Allows the appropriate federal banking agency to require a financial organization to produce, within 120 hours, records or information related to the organization's AML compliance or related to a customer of the organization or any account opened, maintained, administered, or managed in the U.S. by the financial organization.

B.

Provides the U.S. Department of Treasury with the authority to apply graduated, proportionate measures against a foreign jurisdiction, foreign financial organization, type of international transaction, or type of account.

C.

Permits the U.S. Government to seize funds from a correspondent bank account in the U.S. that has been opened and maintained for a foreign bank in the same amount as has been deposited with the foreign bank.

D.

Requires due diligence, and in certain situations enhanced due diligence (EDD), for foreign correspondent accounts, which includes virtually all account relationships that organizations can have with a foreign financial organization and private banking for non-citizens of the U.S.

Full Access
Question # 61

What areas of laws and regulations have the greatest impact on AML/CFT applications? (Choose three.)

A.

Information security, data privacy, and cybersecurity

B.

Foreign exchange control, and precious gemstone and metal dealing

C.

Ombudsman and anti-competition authority

D.

Electronic contract and biological signature acceptance

E.

Consumer protection, financial inclusion, and environmental, social and governance

Full Access
Question # 62

In a standard customer due diligence (CDD) process focused on financial inclusion, the Financial Action Task Force (FATF) Recommendations require: (Choose two.)

A.

identification of the customer's occupation.

B.

identification and verification of the customer's identity.

C.

identification of the customer's work address.

D.

identification of the beneficial owner.

E.

verification of the customer's credit history.

F.

[verification of the customer's income sources.

Full Access
Question # 63

Which of the following are key components of the Know Your Customer (KYC) process? (Select Two.)

A.

Inquiring about the source of wealth and source of funds

B.

Asking to provide a list of immediate family members

C.

Verifying the financial crime awareness of the client

D.

Collecting necessary documents to verify the veracity of information

Full Access
Question # 64

In order to prevent financial crime risk, the implemented policies, controls, and procedures must:

A.

include sophisticated and automated controls that use the newest types of technology available (for example, artificial intelligence (Al) and machine learning).

B.

be proportionate with regard to the size and nature of the firm, approved by senior management, and regularly reviewed

C.

be completed by the business and validated by an external firm (for example, an auditing or consulting firm)

D.

be created approved, and owned only by the First Line of Defense business team, and reviewed annually

Full Access
Question # 65

In which of the following situations would it be most crucial for the designated AML compliance officer of a company to perform a complete review of the company's AML program, including identifying the risks and commensurate controls?

A.

An external audit highlights several deficiencies

B.

The company is merging with or acquiring another entity

C.

Extensive AML legislation is proposed by a legislative body in the company's jurisdiction

D.

A high-profile money laundering case involving another industry is publicized

Full Access
Question # 66

Red flags for potential money laundering in real estate include completing luxury real estate purchases. (Select Two.)

A.

using shell companies or trusts for privacy, lax planning, or asset protection.

B.

in the names of unrelated thud patties.

C.

using the proceeds from selling a prior property or liquidating investments to make an all-cash purchase

D.

using legal entities and intermediaries to protect the privacy of the purchasers.

E.

using loans backed by cash or certificates of deposit.

Full Access
Question # 67

Which of the following are common indicators of possible money laundering within the securities industry? (Choose two.)

A.

Using brokerage accounts like deposit accounts

B.

Receiving securities into an existing brokerage account following the death of a spouse

C.

Allowing fixed income securities to mature

D.

Engaging in transactions involving nominees or third parties

Full Access
Question # 68

Which techniques would be most efficient for a complex investigation of unusual patterns of activity involving multiple businesses, triggered by an automated monitoring system alert? (Select Two.)

A.

Perform a control and ownership assessment of the businesses involved, using the information available in the client files

B.

Contact local law enforcement and request that they assist in the analysis and investigation

C.

Review the information presented in the automated monitoring system's alert description and decline any future transactions

D.

Contact the account manager and ask for the reasons behind the patterns of activity highlighted in the AML alerts

E.

Use social media platforms to connect with the businesses and request details about the account activity

Full Access
Question # 69

Which of the following controls is typically implemented at customer onboarding to mitigate the risk of onboarding high-risk customers?

A.

Enhanced due diligence (EDD)

B.

Transaction monitoring

C.

Customer risk assessment

D.

Sanctions screening

Full Access
Question # 70

A large international bank's chief compliance officer (CCO) is exploring ways to enhance the bank's ability to identify suspicious activities by using intelligence data more effectively. One potential solution is to engage in public-private partnerships (PPPs) to leverage shared intelligence and enhance collaboration with government agencies.

The bank considers joining a PPP initiative with the local Financial Intelligence Unit (FIU) and other financial institutions to improve its access to relevant data and intelligence. The CCO understands that while PPPs can provide significant benefits, such as improved risk detection and enhanced information sharing, there are also potential limitations, including data privacy concerns and differing priorities between public and private sector partners.

Which approach would best maximize the benefits of PPPs for the bank while mitigating the limitations associated with data sharing and intelligence?

A.

Engage in the PPP without strict data sharing protocols, allowing for open and unrestricted flow of information between the bank, FIUs, and other financial institutions

B.

Rely solely on the intelligence provided by government agencies through the PPP because they have the most comprehensive data on suspicious activities

C.

Establish a clear framework within the PPP that outlines data privacy protections and ensures that information sharing complies with legal and regulatory requirements in all jurisdictions involved

D.

Prioritize the bank’s internal data sources over external intelligence from PPPs, as internal data is easier to control and does not present data privacy challenges

Full Access
Question # 71

Which ancillary departments or operational areas can play an essential role in supporting a larger organization's Anti-Money Laundering and Economic Sanctions compliance program? (Choose three.)

A.

Accounting

B.

Model risk management

C.

Technology solutions and IT security

D.

Marketing

E.

Fraud risk management

Full Access
Question # 72

The goal of the Egmont Group of Financial Intelligence Units (FIUs) is to provide a forum for FIUs to: (Select Three.)

A.

Securely share sensitive information in the fight against money laundering and the financing of terrorism

B.

Establish an environment to foster trust amongst countries

C.

Sign memoranda of cooperation that recognize and allow room for case-by-case solutions to specific problems

D.

Improve global cooperation between FIUs

E.

Propose legislation to combat financial crime, including money laundering and the financing of terrorism

Full Access
Question # 73

Which of the following accurately describes the economic, reputational and social consequences of money laundering (ML) and the risks and consequences of violating AFC regulations? (Choose two.)

A.

ML undermines the integrity and stability of financial systems and makes them vulnerable to illegal activity. This can erode investor confidence and hinder economic growth.

B.

When a financial institution (FI) is found to be promoting ML or violating AFC regulations, this can lead to a loss of confidence in the institution and a loss of customers. Interestingly, this scenario might sidestep any legal consequences for the Fl.

C.

When laundered funds flow into legitimate economies, they can be used for illegal purposes, such as funding terrorist activities or organized crime. This distorts resource allocation and undermines development.

D.

Jurisdictions perceived as having insufficient ML measures might be identified as uncooperative or high-risk, potentially facing restricted access to international markets, though economic sanctions by other countries are an unlikely outcome.

Full Access
Question # 74

A large financial institution (FI) is considering expanding business to an area of the world with weak AML laws. The risk-based assessment indicates that the location will increase the FI's risk appetite beyond the stated acceptable amount.

Which risk factors should be used to identify the priority of the FI?

A.

Cash-intensive businesses risks

B.

Unknown third-party risks

C.

Geographic risks

D.

Anonymous transactions risks

Full Access
Question # 75

A law enforcement agency submits several requests to a financial institution.

Which request is legitimate and requires the bank to respond?

A.

Keep an account open upon verbal request

B.

Produce documents and testimony without a subpoena

C.

Seize privileged documents upon written request

D.

Freeze an account in terms of a court order

Full Access
Question # 76

Which practices should financial institutions (FIs) adopt for the process of terminating customer relationships? (Choose three.)

A.

Utilizing a flexible communication style that adapts to different customer situations during the termination process

B.

Implementing a standardized procedure for customer termination that includes risk assessments and necessary documentation

C.

Performing a final review of a customer's transaction history and records to address any unresolved issues prior to termination

D.

Keeping records of the termination process, including the justification for the decision and any correspondence with the customer

E.

Notifying the customer of the termination decision only after completing the termination process to prevent possible disputes

Full Access
Question # 77

The compliance officer at a casino in Taiwan discovers that the casino received multiple cash deposits from a customer just below the Large-Amount Transaction Report (LTR) limit on consecutive days. The customer used three different betting accounts.

What is the appropriate next step?

A.

Make a note in the customer's account that the customer's gambling activities are frequently conducted below the reporting limit

B.

Follow internal reporting procedures to escalate the activity as suspicious and report to appropriate authorities

C.

Inform the customer their activity Is suspicious and request an explanation

D.

Contact law enforcement to launch an Investigation into the customer's financial activities

Full Access
Question # 78

A key factor in the independence of an AML audit is that the auditor should.

A.

have never worked in previous assignments within the AMUCFT departments.

B.

have no involvement with the organization's AML/CP T compliance staff.

C.

have been screened by the board of directors before the audit starts

D.

be sufficiently trained in AML to be able to provide an independent review.

Full Access
Question # 79

Which of the following are included in the 11 Immediate Outcomes outlined in the Financial Action Task Force (FATF) methodology for assessing technical compliance with the FATF Recommendations and the effectiveness of AML/CFT/CPF systems during mutual evaluations? (Select Three.)

A.

International cooperation provides actionable information to use against criminals

B.

Those convicted of money laundering offenses are denied access to basic banking services

C.

Money laundering offenses are investigated and criminally prosecuted

D.

Financial intelligence information is collected by authorities and shared with the FATF for further investigation

E.

Supervisors regulate financial institutions and non-bank financial institutions and their risk-based AML/CFT programs

Full Access
Question # 80

Which activities are part of adverse media screening for negative news and reputational risks? (Select Three.)

A.

Analyzing customer sentiment through feedback and surveys

B.

Identifying individuals or entities linked to criminal activities or sanctions

C.

Periodically monitoring regulatory updates and enforcement actions for associated entities

D.

Scanning publicly available news articles and regulatory alerts

E.

Monitoring changes in credit scores of individuals or entities

Full Access
Question # 81

According to PinCEN. when a financial institution (PI) identities a suspicious activity that necessitates suspicious activity report (SAR) filing, the SAR supporting documentation should (Select Two.)

A.

include all documents or records that assisted the Fl in making the determination that the activity required a filing.

B.

always be limited to account name, account details, and transaction records.

C.

have written policies and procedures to maintain supporting documentation.

D.

be saved in a single separate file with hard copies stored in a fireproof cabinet.

Full Access
Question # 82

Which of the following best describes the use of fuzzy logic in customer screening systems?

A.

It produces outputs that include a range of intermediate possibilities between "Yes" and "No"

B.

It is an advanced analytics tool widely used to implement AFC controls

C.

It allows for a greater number of exact matches, reducing the need for manual review

D.

It is a new technique for enhancing the quality of alerts for review

Full Access
Question # 83

During a routine periodic KYC refresh of a policyholder and client of an insurance company, updated business registry documentation has highlighted that the policyholder's business has changed addresses five times during the last year and that the ultimate beneficial owner (UBO) changed two weeks ago.

What actions should be taken immediately?

A.

Investigate the changes of address and change of UBO and in the meantime decline payment and withdrawal instructions from the policy until completion of the investigation and next steps are agreed upon

B.

Request the relationship manager set up a meeting with the policyholder to update their address and submit details of the new UBO in the name of good customer service

C.

Investigate the changes of address and change of UBO and in the meantime freeze the client's policy

D.

File a suspicious transaction report because the insurance company was not made aware of the business' change of UBO

Full Access
Question # 84

What are the primary sources of reference besides AML laws and regulations when developing and maintaining the AML policies, standards, and procedures of a bank? (Choose three.)

A.

National Risk Assessment

B.

Regulatory guidance or publications

C.

Government or state-run newspapers

D.

Guidance issued by international bodies

E.

Policies and procedures developed by other banks

Full Access
Question # 85

The Basel Committee on Banking Supervision published guidelines on the "Sound management of risks related to money laundering and financing of terrorism."

With regard to identifying and accepting customers, it recommends that banks: (Select Two.)

A.

Establish policies and procedures to ensure due diligence activities are identical for all customers.

B.

Establish policies and procedures to identify and verify customers, beneficial owners, and any individuals that can transact on behalf of their customers.

C.

Establish policies and procedures for customer due diligence that vary based on risk.

D.

Are prohibited from offering numbered accounts to customers, even if procedures are established to gather and maintain due diligence information.

E.

Establish policies and procedures that encourage processing transactions while due diligence information is being established and verified.

Full Access
Question # 86

According to the Financial Action Task Force (FATF). potential risk indicators related to money laundering proceeds from environmental crimes include. (Select Two.)

A.

waste management sector companies based in high-risk jurisdictions with payments or trade invoices tor types of waste aligned with those they are authorized to process.

B.

frequent payments from companies in the logging. milling, or waste trade sectors to individuals or beneficiaries unrelated to the legal parson activity or business.

C.

unexplained wealth and cash transfers involving senior officials or politically exposed persons for their family members) with a position of responsibility related to the management or preservation of natural resources.

D.

small cash transfers from cash-Intensive businesses to beneficiaries in areas known as a source of gold mining, illegal logging, and Illegal land clearing.

Full Access
Question # 87

Non-compliance with relevant anti-money laundering laws and regulations can result in: (Select Two.)

A.

increased reputation risk.

B.

inclusion on the UN Consolidated List.

C.

civil and criminal penalties

D.

delisting of public filing status.

Full Access
Question # 88

Which statement regarding data privacy is the most accurate in the context of AML investigations?

A.

Organizations are required to demonstrate that customers have opted into information sharing before submitting suspicious activity reports to relevant financial intelligence units (FIUs)

B.

Any customer that is the subject of a suspicious report filing has the right to request redaction of their personal data

C.

FIUs should document purposes for which personal data included on suspicious activity reports may be shared with other agencies

D.

Data privacy laws prohibit information sharing between financial institutions for the purposes of AML investigations in all jurisdictions

Full Access
Question # 89

It Is important for financial institutions (FIs) to be aware of anti-financial crime (AFC) and sanctions regulatory regimes in other jurisdictions in order to.

A.

maintain compliance with the AFC and sanctions requirements of all countries where the F1 operates or has business relationships and to avoid penalties for violations in foreign jurisdictions.

B.

ensure that sanctions regimes are applied selectively based on the regulatory standards of the countries where business activities occur, focusing primarily on aligned jurisdictions

C.

compensate for the limited applicability of AFC and sanctions regulations on cross-border transactions and their reduced relevance for domestic operations in other jurisdictions.

D.

ensure the F1 can manage business relationships in jurisdictions with stricter or more lenient regulations than their home country, allowing for operational flexibility

Full Access
Question # 90

A multinational corporation is considering expanding into a new market with a history of political instability and corruption.

Which strategy would be most effective in mitigating reputational risk from a financial crime perspective associated with such an expansion?

A.

Ensure the jurisdiction risks and other relevant factors have been taken into consideration in the EWRA and the residual risks are within the corporation's risk appetite

B.

Partnering with established local businesses to leverage their knowledge and connections while sharing risks

C.

Ensuring the company has strong ties with local government officials to influence policy and avoid negative scrutiny

D.

Committing to open communication, ethical practices, and community engagement to build trust with stakeholders

E.

Minimizing the company's direct presence in the country to reduce exposure to potential risks

Full Access
Question # 91

The Financial Intelligence Unit (FIU) in a country has received a suspicious activity report (SAR) which involves significant suspicious fund transfers, not only within its jurisdiction but also in a foreign country. Further information is required from the foreign country to determine whether the matter needs to be referred for prosecution locally.

Which of the following statements is true in this scenario?

A.

It is against international laws on data protection to access information from foreign countries

B.

Sovereignty of nations means that information cannot be accessed from foreign countries

C.

Any information related to money laundering can be received from any organization at any time regardless of jurisdiction

D.

Countries that are members of the Egmont Group can request assistance for information from each other

Full Access
Question # 92

The US Department of the Treasury notes that which of the following represent high money laundering risk when de-risked from traditional financial institutions (FIs)? (Choose two.)

A.

Money services business (MSB)

B.

Multinational corporations

C.

Individual foreign customers

D.

Non-profit organizations with international operations

Full Access
Question # 93

A sound AML compliance program requires a comprehensive governance framework that addresses key elements to ensure the integrity of the financial system.

Which element forms the starting point of an effective AML compliance program?

A.

Ongoing monitoring

B.

Risk assessment

C.

Policies and procedures

D.

Suspicious activity reporting

E.

Customer due diligence

Full Access