Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CCAS Questions and Answers

Question # 6

A virtual asset service provider (VASP) is using public information on the blockchain to trace a wallet address. Which additional step is necessary to identify the owner or controller of that address?

A.

Review the wallet address information periodically.

B.

Acquire information to connect the wallet address to a natural person.

C.

Screen the wallet address for any historical transaction activity.

D.

Obtain further information connecting wallet address to virtual asset transactions.

Full Access
Question # 7

Which governance function is ultimately responsible for approving AML/CFT policies?

A.

MLRO

B.

Board of Directors

C.

Compliance officer

D.

Chief Executive Officer

Full Access
Question # 8

Which key differences between the Bitcoin and Ethereum blockchains must investigators consider when investigating flows of funds on each respective chain? (Select Two.)

A.

Transaction cost

B.

Variety of applications, assets, and networks

C.

Address length

D.

Ledger model

Full Access
Question # 9

What Is the purpose of applying learning(ML)or artificial Intelligence (Al)within a compliance framework? (Select two.)

A.

To reduce the requirementfor risk assessment

B.

To enhance efficiency

C.

To reduce headcount

D.

To focus skilled resource on higher value activity

Full Access
Question # 10

Under DIFC AML regulations, enhanced due diligence (EDD) ismandatorywhen:

A.

A customer is a domestic bank.

B.

The customer is from a high-risk jurisdiction.

C.

The transaction is above USD 1,000.

D.

The customer is a retail investor.

Full Access
Question # 11

Which activity is most commonly associated with mixing and tumbling as a method of laundering cryptoassets?

A.

Presence of unknown or disguised source of funds

B.

Rapid purchase and sale of different cryptocurrencies

C.

Use of IP address concealing software

D.

Frequent transactions to high-risk jurisdictions via different virtual asset service providers

Full Access
Question # 12

Which type of wallet poses the highest AML risk?

A.

Exchange hot wallet

B.

Custodial wallet

C.

Unhosted wallet

D.

Multi-signature wallet

Full Access
Question # 13

Which activity should be detected as a red flag during the customer onboarding stage and further investigated?

A.

Receipt of a law enforcement request to examine transactions on the customer's account

B.

The applicant being located in the same jurisdiction as the virtual asset service provider

C.

The use of a foreign identification document by an immigrant

D.

Sharing of the same IP address by multiple customers

Full Access
Question # 14

A firm using blockchain analytics finds an address that sent funds through multiple hops before reaching a darknet market wallet. This is an example of:

A.

Direct exposure

B.

Indirect exposure

C.

Mixing

D.

Transaction batching

Full Access
Question # 15

A suspicious activity report was filed in the EU for a local company account that held funds generated by the sale of product coupons. A review of the account highlighted a login from an unconnected IP address. Despite repeated requests, the customer failed to provide information on the origins of the funds. Which is the main red flag here?

A.

Virtual asset service providers outside of the EU are being relied upon.

B.

Funds are generated by the sale of coupons which are connected to a physical product.

C.

There is a failure to cooperate with the source of funds requests.

D.

An IP address is being used that is not previously connected to that customer.

Full Access
Question # 16

In cryptoasset AML programs, “ongoing monitoring” means:

A.

Checking customer activity only when onboarding

B.

Continuous review of transactions to detect anomalies

C.

Only screening customers for sanctions once

D.

Freezing all suspicious accounts

Full Access
Question # 17

In the context of forensic cryptocurrency investigations, which statement best describes how attribution data are collected?

A.

Taken from business-maintained records.

B.

Derived from public and non-public sources.

C.

Gathered from a publicly available blockchain.

D.

Obtained automatically from the darknet.

Full Access
Question # 18

In cryptoasset compliance, “integration” refers to:

A.

Converting illicit crypto into fiat or legitimate assets.

B.

Mixing crypto to hide origins.

C.

Transferring crypto between wallets.

D.

Staking assets to earn rewards.

Full Access
Question # 19

Which features are used by anonymity-enhanced cryptoassets to reduce transparency of transactions and identities? (Select Two.)

A.

Proof-of-stake mining

B.

Automatic mixing

C.

Secure hashing algorithm 256

D.

Cryptographic enhancements

E.

MetaMask wallet

Full Access
Question # 20

Which operational risk mitigation practice by virtual asset service providers (VASPs) is most effective when considering their relationships with other VASPs?

A.

Having no requirement to establish a correspondent relationship and build a risk assessment framework among other cryptoasset exchanges prior to transferring for or on behalf of another person

B.

Developing cross-border correspondent relationships with cryptoasset exchanges in jurisdictions that have weak or non-existent anti-money laundering (AML) regulation or supervision

C.

Assigning all such relationships as high risk and conducting enhanced due diligence on all of them

D.

Gathering sufficient information on the counterpart VASP to determine the quality of the supervision it receives for transactional activities

Full Access
Question # 21

What three classifications of assets does the Markets in Crypto-Assets Regulation (commonly known as MICA) apply to? (Select Three.)

A.

Meme coins

B.

Electronic money tokens

C.

Privacy coins

D.

Cryptoassets

E.

Asset-referenced tokens

Full Access
Question # 22

Which advantage ofthe proofof work consensus algorithm is widely applicable in many cryptocurrencies and other blockchainsystems?

A.

Dependency on electricity

B.

Centralization of the consensus mechanism

C.

Verification of transactions by solving complex mathematical puzzles

D.

Security of small networks

Full Access
Question # 23

Which is the first action a virtual asset service provider (VASP) should take when it finds out that its customers are engaging in virtual asset (VA) transfers related to unhosted wallets and peer-to-peer (P2P) transactions?

A.

Allow VA transfers related P2P or unhosted wallets below 1,000 USD or the equivalent amount in local currency, or per defined thresholds in local regulations.

B.

Freeze accounts with records of transactions related to P2P transactions or unhosted wallets.

C.

Collect and assess the data on transactions related to P2P or unhosted wallets to determine if it is within its risk appetite.

D.

Enhance existing risk-based control framework to account for specific risks posed by transactions related to P2P or unhosted wallets.

Full Access
Question # 24

A customer who runs a cryptoasset automated teller machine (ATM) comes into a financial institution and deposits a larger than usual amount. When asked about the deposit, the customer answers there has been broader adoption of cryptoassets in the region where the ATM is located. Which additional information about the business would indicate high risk for money laundering? (Select Two.)

A.

The volume and the number of users increase.

B.

The cryptoasset ATM supports a variety of cryptoassets.

C.

The region is neighboring with a narcotic-producing jurisdiction.

D.

The region is located within a high-risk jurisdiction.

E.

The cryptoasset ATM was recently licensed.

Full Access
Question # 25

Which blockchain features built-in privacy measures to prevent tracing and conceal ownership and flow of illicit funds?

A.

Cardano

B.

Polygon

C.

Ethereum

D.

Monero

Full Access
Question # 26

Which of the following are functions of cryptoasset mining? (Select Two.)

A.

Generating new cryptoassets

B.

Ensuring the security of the network

C.

Optimizing and improving the functionality of the network

D.

Validating transactions on the blockchain

Full Access
Question # 27

To identify and assess the money laundering risks emerging from virtual assets, countries should ensure that virtual asset service providers are: (Select Two.)

A.

Connected with a regulated financial institution.

B.

Subjected to AML regulations

C.

Maintaining effective monitoring systems.

D.

Located in a jurisdiction with increased regulatory expectations

E.

Evaluated for beneficial ownership of virtual asset clients

Full Access
Question # 28

Which key type of information allows financial intelligence units to combat the risk of anonymity in virtual currencies?

A.

The data referring to the timing of the transaction

B.

The data reconciling the transaction and the identity of the receiver

C.

The data connecting the transaction information to the virtual address

D.

The data associating the virtual address to the identity of the owner

Full Access
Question # 29

Which blockchain feature ensures that once a block is added, it cannot be altered without network consensus?

A.

Consensus algorithm

B.

Hash immutability

C.

Tokenization

D.

Peer-to-peer networking

Full Access
Question # 30

Which first step should a VASP take upon detecting repeated transactions to a high-risk wallet?

A.

Immediately freeze the account.

B.

Conduct internal investigation and enhanced due diligence.

C.

Publicly disclose the wallet.

D.

Notify all customers.

Full Access