A virtual asset service provider (VASP) is using public information on the blockchain to trace a wallet address. Which additional step is necessary to identify the owner or controller of that address?
Which governance function is ultimately responsible for approving AML/CFT policies?
Which key differences between the Bitcoin and Ethereum blockchains must investigators consider when investigating flows of funds on each respective chain? (Select Two.)
What Is the purpose of applying learning(ML)or artificial Intelligence (Al)within a compliance framework? (Select two.)
Which activity is most commonly associated with mixing and tumbling as a method of laundering cryptoassets?
Which activity should be detected as a red flag during the customer onboarding stage and further investigated?
A firm using blockchain analytics finds an address that sent funds through multiple hops before reaching a darknet market wallet. This is an example of:
A suspicious activity report was filed in the EU for a local company account that held funds generated by the sale of product coupons. A review of the account highlighted a login from an unconnected IP address. Despite repeated requests, the customer failed to provide information on the origins of the funds. Which is the main red flag here?
In the context of forensic cryptocurrency investigations, which statement best describes how attribution data are collected?
Which features are used by anonymity-enhanced cryptoassets to reduce transparency of transactions and identities? (Select Two.)
Which operational risk mitigation practice by virtual asset service providers (VASPs) is most effective when considering their relationships with other VASPs?
What three classifications of assets does the Markets in Crypto-Assets Regulation (commonly known as MICA) apply to? (Select Three.)
Which advantage ofthe proofof work consensus algorithm is widely applicable in many cryptocurrencies and other blockchainsystems?
Which is the first action a virtual asset service provider (VASP) should take when it finds out that its customers are engaging in virtual asset (VA) transfers related to unhosted wallets and peer-to-peer (P2P) transactions?
A customer who runs a cryptoasset automated teller machine (ATM) comes into a financial institution and deposits a larger than usual amount. When asked about the deposit, the customer answers there has been broader adoption of cryptoassets in the region where the ATM is located. Which additional information about the business would indicate high risk for money laundering? (Select Two.)
Which blockchain features built-in privacy measures to prevent tracing and conceal ownership and flow of illicit funds?
To identify and assess the money laundering risks emerging from virtual assets, countries should ensure that virtual asset service providers are: (Select Two.)
Which key type of information allows financial intelligence units to combat the risk of anonymity in virtual currencies?
Which blockchain feature ensures that once a block is added, it cannot be altered without network consensus?
Which first step should a VASP take upon detecting repeated transactions to a high-risk wallet?