11.11 Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ACAMS > AML Certifications > CAMS

CAMS Certified Anti-Money Laundering Specialist (CAMS7 the 7th edition) Question and Answers

Question # 4

An agent of a wealthy individual residing in Country A, which is on the EU list of high-risk third jurisdictions, approaches a notary in Country B, which is in the EU. The agent wants to complete a disposal of assets recently acquired at auction by the wealthy individual through an offshore company. The agent also has a power of attorney to act on behalf of the offshore company issued by a respectable law firm from Country C, which is also in the EU. The agent asks the notary to proceed with the disposal as quickly as possible without paying any specific attention to related costs or taxes to be paid as a result of this transaction. The notary notices the intended transfer price is significantly lower than the one recorded at auction, but the agent does not want to discuss this matter and claims that it is not covered by the power of attorney.

Which red flags should the notary consider? (Select Two)

A.

The agent requested a disposal of assets at a lower price than recently acquired.

B.

The assets acquired through an auction were put in the name of an offshore company

C.

The agent acted on behalf of an individual residing in a country which is on the EU's list of high-risk jurisdictions

D.

The power of attorney was issued by a law firm in a different EU country from where the transaction took place.

Full Access
Question # 5

Arecruitment manager in the human resources departmentof a bank hasshortlisted a candidate for the position of relationship manager in its private banking division.

Thebank’s compliance policyrequiresproper background checksto protect againstfraud and money laundering risks.

Whichresourceswould bemost usefulfor identifying potential negative information regarding the shortlisted candidate? (Select Three.)

A.

Past employment records.

B.

Personal references from close associates.

C.

Personal resume.

D.

Internet and public media searches.

E.

Criminal history searches.

Full Access
Question # 6

In which of the following cases can a financial institution disclose a suspicious activity report (SAR)?

A.

A court order requests the bank to disclose the SAR subject to obtaining agreement from the legal team

B.

A customer asks about potential reporting to the local Financial Intelligence Unit (Fill)

C.

An external consultant inquires about the details of the SAR

D.

A third-country police directly inquires about the customer.

Full Access
Question # 7

A financial institution is designing an enterprise-wide risk assessment (EWRA).

According to the guidance issued by the Wolfsberg Group regarding a risk-based approach to identifying and managing money laundering risks, an effective approach should:

A.

Focus on understanding the risks presented by new clients within the assessment period, and the controls to mitigate associated money laundering risks.

B.

Include appropriate measures and controls to mitigate money laundering risks stemming from higher-risk customers, products, and geographies.

C.

Focus on the inherent risk in the FI's product and service offerings and the controls to mitigate potential money laundering risks.

D.

Use a framework provided by a third-party vendor and used by other FIs in the jurisdiction.

Full Access
Question # 8

Which red flags could indicate increased terror financing and money laundering risks related to cultural objects? (Select Three.)

A.

Engagement of third-party art advisors as representatives at art auctions

B.

High-quality single pieces of significant value sold on social media platforms

C.

Use of art and antiquity experts to verify an item's authenticity

D.

Paying fair market value or premium prices for valuable art, gems, or precious metals at auction

E.

Use of art storage facilities located in tax-free zones

Full Access
Question # 9

A prospective client walks into an accounting firm wanting to incorporate a company. The accountant feels uncomfortable after the meeting.

Which two of the accountant's observations warrant escalation to the compliance officer? (Select Two.)

A.

The principal activities of the proposed company are importing and exporting new furniture

B.

The prospective client presents confusing details about the proposed business and has very little knowledge about the proposed business activity

C.

The prospective client is unable to provide information about the beneficial owners

D.

The prospective client exhibits confidence when speaking to the accountant when providing personal details

E.

The prospective client is able to provide source of funds and source of wealth documents

Full Access
Question # 10

During a routine periodic KYC refresh of a policyholder and client of an insurance company, updated business registry documentation has highlighted that the policyholder's business has changed addresses five times during the last year and that the ultimate beneficial owner (UBO) changed two weeks ago.

What actions should be taken immediately?

A.

Investigate the changes of address and change of UBO and in the meantime decline payment and withdrawal instructions from the policy until completion of the investigation and next steps are agreed upon

B.

Request the relationship manager set up a meeting with the policyholder to update their address and submit details of the new UBO in the name of good customer service

C.

Investigate the changes of address and change of UBO and in the meantime freeze the client's policy

D.

File a suspicious transaction report because the insurance company was not made aware of the business' change of UBO

Full Access
Question # 11

Which of the following describes a role of the Financial Action Task Force (FATF)?

A.

Oversight of the Financial Intelligence Units in FATF Member countries

B.

Providing a unique platform for information exchange regarding anti-money laundering efforts

C.

Regulation of financial markets through directives and executive orders

D.

Enhancement of international cooperation to foster anti-money laundering efforts via recommendations and guidance

Full Access
Question # 12

Which statement about the extraterritorial reach of US laws and legislation is accurate?

A.

The Bank Secrecy Act (BSA) extraterritorial reach requires that the Travel Rule be applied to all financial institutions globally, including all USD transactions

B.

The Anti-Money Laundering Act of 2020 (AML Act) extraterritorial reach covers all USD transactions throughout the global economy

C.

The Office of Foreign Assets Control's (OFAC's) economic and trade sanctions may pose extraterritorial risks for financial institutions and businesses outside of the US

D.

Section 319(b) of the USA PATRIOT Act extraterritorial reach permits the seizure of funds from a correspondent bank account in the US that have been opened and maintained for the foreign bank

Full Access
Question # 13

A long-term client of an insurance company makes changes to a policy that require payment of an additional lump sum. The amount payable is high, though within the client's means based on the KYC information collected. The payment is made via a company in another jurisdiction that is known to have lax AML controls.

Which indicator of suspicious activity is present?

A.

A long-term client wants a change to a policy that is already in force

B.

The payment was made via a company that appears to be owned and controlled by the client being insured

C.

The additional premium payable appears to be within the client's means based on the KYC information collected

D.

The payment was made via a company in a jurisdiction known to have lax AML controls

Full Access
Question # 14

A financial institution is exploring automation to assist investigators in reviewing flagged transactions. Currently, investigators spend a significant amount of time gathering data from multiple sources.

Which of the following automation features would be most effective in improving investigator efficiency?

A.

Pre-populated templates for SAR filing

B.

Integration of open-source tools to gather real-time intelligence

C.

Automated case prioritization based on risk scoring

D.

AI-powered dashboards summarizing flagged transactions

Full Access
Question # 15

An employee at a financial institution (FI) suspects that one of their co-workers is involved in a financial investment scam syndicate.

Which step should be taken next by the employee who has the suspicion?

A.

Conduct an open-source intelligence investigation using artificial intelligence tools to gain more information on the activities of the suspected employee

B.

Use the FI's whistleblowing channel to report the suspected employee

C.

Question their co-worker to determine if their suspicions are correct before reporting to the FI's Human Resources department

D.

Warn colleagues and customers of the FI that the employee's suspicious financial investment proposals could be a scam

E.

Report the suspected employee to the line manager of the FI to take the required action

Full Access
Question # 16

Which technologies are commonly used to help financial institutions (FIs) navigate privacy and data protection regulations while securely sharing client information with private third-party entities? (Choose two.)

A.

Blockchain to ensure traceability and security in shared data transactions

B.

Data encryption to protect sensitive information from unauthorized access

C.

Privacy-enhancing technologies (PETs) to enable secure and privacy-compliant data sharing

D.

Artificial intelligence (AI) to automating compliance processes like data anonymization and secure sharing

E.

Cloud storage solutions for efficient data handling and management

Full Access
Question # 17

An organization is developing a comprehensive anti-money laundering (AML) framework.

Which of the following statements best describes the relationship between AML policies and procedures?

A.

Policies are detailed instructions for specific processes. Procedures are an overarching framework. Neither policies nor procedures are mandatory for knowledge and adherence

B.

Policies are broad guidelines. Procedures are detailed Instructions for specific processes. Only procedures are mandatory for knowledge and adherence.

C.

Policies are detailed instructions for specific processes Procedures are an overarching framework Both policies and procedures are mandatory for knowledge and adherence.

D.

Policies define the principles of an organization and influence the drafting of procedures. Procedures are detailed instructions for specific processes.

Full Access
Question # 18

The primary objectives of the United Nations in developing sanctions regimes include: (Select Three.)

A.

to force developing nations to adopt liberal or substantive democracies.

B.

to support governments and regimes in the peaceful resolution of conflict.

C.

to punish governments for having weak financial crime controls.

D.

to deter non-democratic and non-constitutional changes within countries.

E.

to support the protection of human rights.

Full Access
Question # 19

Which risks are specifically associated with the misuse of gaming accounts in financial crime? (Choose three.)

A.

Using gaming accounts to transfer illicit funds between players undetected

B.

Structuring transactions to avoid reporting thresholds by keeping them under certain limits

C.

Providing false personal information to evade regulatory oversight

D.

Ensuring identity verification is completed prior to the onboarding of new customers

E.

Investing all gaming winnings into high-risk stocks to conceal funds

Full Access
Question # 20

Which of the following attributes would enhance an AML program's effectiveness?

A.

Providing basic AML training to all employees

B.

An AML officer being appointed to the board as a working member of management with increased authority

C.

Auditors providing prescriptive guidance and support to the program following a less than satisfactory audit

D.

Providing effective challenge with AML staff and continuous cross-training

Full Access
Question # 21

The first line of defense is responsible for:

A.

collecting complete customer information.

B.

ongoing screening of customers.

C.

suspicious activity and sanctions reporting.

D.

evaluating the effectiveness of compliance controls.

Full Access
Question # 22

Which of the following actions is specifically permitted or required under FinCEN section 314(b) for financial institutions (FIs) to enhance their efforts in combating money laundering and terrorist financing?

A.

FIs may disclose customer information to any third party

B.

FIs may provide information about their internal compliance programs to law enforcement agencies without any limitations

C.

FIs are required to report all transactions involving foreign entities to FinCEN so that FinCEN can share this information with other financial institutions

D.

FIs may share information about suspected money laundering activities with other FIs to aid in identifying and reporting suspicious transactions

Full Access
Question # 23

Which persons must always comply with all Office of Foreign Assets Control (OFAC) regulations? (Select Three.)

A.

Permanent US resident aliens regardless of location

B.

Merchants that offer US-origin goods for sale regardless of location

C.

Non-US financial institutions that offer accounts in USD regardless of location

D.

US citizens regardless of location

E.

US incorporated entities and their foreign branches

Full Access
Question # 24

What is the relationship between the EU Anti-money Laundering Directives (AMLD) and local anti-money laundering (AML) regulations in European Union (EU) member states, in terms of their relevance for, applicability to, and impact on EU banks? (Select Two.)

A.

The EU AMLD and local AML regulations are separate and unrelated legal frameworks.

B.

The EU AMLD and local AML regulations must have identical requirements.

C.

Local AML regulations may impose additional or more stringent requirements than the EU AMLD.

D.

The EU AMLD take precedence over local AML regulations.

E.

Local AML laws and regulations override the requirements of the EU AMLD.

F.

The EU AMLD provide a framework that member countries must implement through local AML regulations.

Full Access
Question # 25

Which of the following statements describe the strengths associated with public-private partnerships (PPPs)? (Choose two.)

A.

Public organizations can belter understand what the private sector experiences and inform policy and the enactment of laws

B.

Data-protection privacy policies provide an opportunity to develop information sharing protocols to prevent unauthorized access to information

C.

Data-protection privacy policies prohibit the evolution of PPPs due to restrictions based on legacy government legislation

D.

Small business owners can choose third-party providers or financial institutions to keep their private data safe which can easily be shared within a PPP

Full Access
Question # 26

When applying new technologies to AML, application programming interfaces (APIs) allow for:

A.

Digital identification on mobile devices

B.

Different applications to connect and communicate

C.

Authentication via artificial intelligence (AI) and biometrics

D.

Quick CDD and client traits analysis during onboarding

Full Access
Question # 27

How can public-private partnerships (PPPs) foster collaboration in the fight against financial crime? (Choose two.)

A.

Developing a culture of compliance

B.

Improving governance in the public sector by requesting feedback from financial institutions

C.

Reducing transaction monitoring false positives for all financial institutions

D.

Improving the quality and quantity of data available for analysis by sharing information

Full Access
Question # 28

An AML compliance officer receives an independent audit report with a number of findings.

An appropriate response to the report would include:

A.

Drafting detailed action plans for the audit team to execute to close the findings

B.

Reperforming the testing for the controls mentioned in the findings to confirm the results of the audit

C.

Defining remedial actions based on the findings' root cause analysis

D.

Assigning responsibility for reviewing the action plan to the board of directors

Full Access
Question # 29

Why is it important to use multiple sanctions lists, such as United Nations (UN), Office of Foreign Assets Control ("OFAC"), and European Union ("EU") lists, in name screening systems?

A.

To avoid sanctions breach related to payments

B.

To avoid onboarding customers previously exited due to true match

C.

To meet international regulatory requirements and identify risks across jurisdictions

D.

To be in line with the risk appetite statement

Full Access
Question # 30

The recently appointed senior money laundering reporting officer (MLRO) at a newly opened small digital bank has been instructed by the group chief compliance officer to implement an effective AML transaction monitoring system that can identify unusual and suspicious transactions.

What are important considerations for the project to select and implement the AML transaction monitoring system at the digital bank? (Select Two.)

A.

Whether the vendor has documented appropriate internal controls for designing system and data integration schema

B.

Whether the permissions and user access settings for reviewing, investigating, and reporting details of alerts generated by the system are commensurate with those in use at other banks

C.

Whether the monitoring system is adequate with respect to the bank's size, activities, complexity, and risks

D.

Whether the monitoring system can be configured to enable the bank to execute trend analysis of transaction activity and to identify unusual business relationships and transactions

Full Access
Question # 31

The Office of Foreign Assets Control (OFAC) is responsible for:

A.

Ensuring an effective export control and treaty compliance system

B.

Administering and enforcing economic and trade sanctions

C.

Designating jurisdictions as primary money laundering concerns

D.

Managing trade agreements between the US and foreign countries

Full Access
Question # 32

Which of the following best describes one of the principal threats of proliferation financing?

A.

Adversary governments using sophisticated attacks to threaten critical infrastructure and sectors, including finance, health care and energy

B.

Networks of individuals and entities exploiting financial systems to move funds that will be used to acquire weapons of mass destruction or their components

C.

Transnational criminal organizations expanding their engagement into more varied types of illicit activities, including human trafficking and corruption

D.

Networks of individuals and entities raising funds to further proliferate their ideological goals wholly or in part through unlawful acts of force or violence

Full Access
Question # 33

What is the first step that an investigator should take when beginning a financial investigation into a potential suspicious activity?

A.

Determining whether the potential suspicious activity is consistent with the customer's transactional behavior, nature of business, and occupation

B.

Contacting the country's financial intelligence unit's (FIU's) officers to seek advice on whether the potential suspicious activity is indeed a suspicious activity

C.

Gathering and assessing internal sources of information, including information obtained from the customer, transactions, and value and volume

D.

Identifying and reviewing external information, including online presence, customer-related entities, and relevant media

Full Access
Question # 34

Which of the following scenarios describe common risk indicators of money laundering faced by operators of legitimate money services businesses (MSBs)? (Select Three.)

A.

A customer changes multiple high-denomination notes to low-denomination notes.

B.

A customer conducts cash transactions using multiple branches of the MSB on the same day.

C.

A customer has a family link to the destination of a money transfer

D.

A customer sends and receives money transfers in equal amounts at or about the same time.

E.

A customer only wants to deal with a particular employee in the MSB.

Full Access
Question # 35

A financial crimes risk appetite statement describes:

A.

how an organization defines Its risk-based approach.

B.

how an organization determines its key risk and performance indicators.

C.

the level and type of risk the organization is willing to take to meet its objectives

D.

the purpose of an organization's financial crimes compliance program.

Full Access
Question # 36

Which principle about safeguarding privacy and data should an auditor adhere to when performing an AML investigation?

A.

AML and Data Protection Privacy laws should not be mutually exclusive.

B.

During evidence gathering, privacy laws are less important than local AML laws.

C.

Terrorist financing is more relevant in the context of data protection and supersedes laws.

D.

Countries should clarify where AML and Data Protection Privacy laws are not balanced.

Full Access
Question # 37

Which of the following businesses require enhanced or additional scenarios for identifying anomalous transactions? (Select Two.)

A.

Companies operating in cash intense businesses not subject to licensing requirement

B.

Companies operating hospitals and health-care services

C.

Companies operating in cash intense businesses subject to licensing requirement

D.

Companies producing pharmaceutical products and medical devices, companies active in the mining industry

E.

Companies operating retail shops countrywide

Full Access
Question # 38

Which role within private banking has the best placement to identify and report money laundering risk?

A.

Investment advisor

B.

Relationship manager

C.

Operations manager

D.

Compliance officer

Full Access
Question # 39

Under the Egmont Group Principles, information exchange among financial intelligence units (FIUs) should be conducted:

A.

Without the expectation of reciprocity on how the information will be used.

B.

Only if the status of the foreign FIU is related to law enforcement.

C.

Freely, spontaneously, and upon request, on the basis of reciprocity.

D.

With set limits on the amount of financial and administrative information provided.

Full Access
Question # 40

Which collective body of Financial Intelligence Units (FlUs) was formed with an objective to improve Information exchange and sharing mechanisms among member FlUs as well as to support its members by enhancing their capabilities'?

A.

The Organisation for Economic Co-operation and Development (OECD)

B.

The Egmont Group

C.

The Wolfsberg Group

D.

The International Monetary Fund (IMF)

Full Access
Question # 41

A legal instrument which is executed between two nations and governs cross-border information sharing Is known as a.

A.

mutual legal assistance treaty.

B.

memorandum of understanding.

C.

request for urgent information.

D.

declaration of understanding.

E.

memorandum of agreement.

Full Access
Question # 42

A financial institution's US Branch receives a subpoena from law enforcement requesting detailed records of a customer's account activity. The customer is part of an ongoing investigation into a money laundering operation. At the same time, the institution has received a FinCEN 314(b) information-sharing request from another bank seeking details on transactions linked to the same customer. The compliance team is tasked with responding to both the subpoena and the FinCEN 314(b) request.

What should the compliance officer prioritize in responding to these requests while ensuring that all legal and regulatory obligations are met?

A.

Notify the customer of the information-sharing request from the other financial institution and seek their consent before responding

B.

Consult the institution's legal counsel to validate the subpoena, then respond directly to law enforcement while ensuring all documentation is properly recorded

C.

Respond to the FinCEN 314(b) request first, as it allows for voluntary information sharing with partner organizations

D.

Provide the requested records to both law enforcement and the other financial institution immediately to ensure full cooperation and transparency

Full Access
Question # 43

Tax evasion is:

A.

a deliberate attempt not to pay the tax which is due or obliged.

B.

bending the rules to pay less tax than required.

C.

not an important crime as it does not impact society.

D.

a sophisticated process which always means the same as tax avoidance.

Full Access
Question # 44

A US bank recently received a regulatory order to remediate its AML programs, which included several violations of law.

What degree of accountability is it possible for the bank's senior management and employees to face?

A.

The bank's designated AML compliance officer is likely to face criminal prosecution because the bank received a regulatory order

B.

The bank's designated AML compliance officer and senior management can face civil prosecution but not criminal prosecution for violation of AML laws

C.

The bank's designated AML compliance officer and senior management may face personal liability if they failed to take actions while aware of AML violations at the bank

D.

The bank's designated AML compliance officer is the only individual in the company's senior management team that can face personal liability for violation of AML laws

Full Access
Question # 45

Which scenario best justifies why a customer's account might be closed by a financial institution?

A.

The customer is the object of a civil subpoena.

B.

The customer uses a shipping company dealing with specially designated nationals.

C.

The account shows periodic fixed amount remittances for tuition fees.

D.

The account has transactions that triggered multiple suspicious activity reports.

Full Access
Question # 46

Which risks inherent to real estate sector carry the highest AML/CFT risk? (Select Two.)

A.

Use of cash to purchase property

B.

Unlicensed real estate agents acting as front companies

C.

Use of a registered trust for the purchase of property

D.

Use of a company for the purchase of property

E.

Manipulation of the value of a property

Full Access
Question # 47

Based on the AML principles outlined by the Wolfsberg Group, what do private and correspondent banks have in common when monitoring for terrorist financing?

A.

Cash access from a pre-paid card increases the potential that the card will be used for money laundering purposes.

B.

Transaction monitoring examines the relationship between due diligence information and account closings.

C.

Account and transactional activity are monitored after the proper identification and verification of customers.

D.

Numbered or alternate name accounts will only be accepted if the bank has established the identity of the client and beneficial owner.

Full Access
Question # 48

During which process must a country demonstrate to the Financial Action Task Force (FATF) that it has an effective framework to protect the financial system from abuse?

A.

Formal assessment

B.

Regulatory overview

C.

Technical analysis

D.

Mutual evaluation

Full Access
Question # 49

A key factor in the independence of an AML audit is that the auditor should.

A.

have never worked in previous assignments within the AMUCFT departments.

B.

have no involvement with the organization's AML/CP T compliance staff.

C.

have been screened by the board of directors before the audit starts

D.

be sufficiently trained in AML to be able to provide an independent review.

Full Access
Question # 50

Money services businesses (MSBs), payment service providers, and e-commerce platforms usually have a high volume of daily transactions.

What are the risks associated with these types of businesses? (Choose two.)

A.

These businesses are all cash intensive, increasing the risk of financial crime

B.

KYC challenges arise because e-commerce platforms face global customers making customer due diligence complex and resource intensive

C.

These businesses are highly regulated and therefore have no reason to be non-compliant as this would put them at risk of sanctions and fines

D.

Criminals can make use of identify fraud to fulfill KYC processes for layering purposes

E.

The settlement systems of these businesses are not sophisticated enough to cope with the high transaction volume

Full Access
Question # 51

An AML analyst at a financial institution is examining an alert generated by the automated transaction monitoring system to determine whether the alert should be escalated to the AML unit for further investigation or whether it can be archived as a false positive.

Which action might be reasonable for the AML analyst to take?

A.

Restrict the client's access to the account

B.

Request information from the relationship manager assigned to the account that caused the alert

C.

Perform below-the-line testing to ensure the automated monitoring system is operating effectively

D.

Send a request for information to the counterparty bank involved in the transaction that caused the alert

Full Access
Question # 52

A financial institution is conducting an enterprise-wide risk assessment (EWRA) and has identified a high inherent risk of money laundering associated with its private banking division due to the clientele’s high net worth and complex financial structures. However, the institution has implemented robust customer due diligence (CDD) and enhanced due diligence (EDD) procedures, along with sophisticated transaction monitoring systems.

How would these controls impact the assessment of residual risk?

A.

The residual risk would be eliminated entirely because the controls are sufficient to mitigate all potential risks

B.

The residual risk would be significantly reduced due to the effectiveness of the controls in place

C.

The residual risk would remain high due to the inherent nature of the private banking business

D.

The residual risk would be moderately reduced, but further controls may be necessary to achieve an acceptable level

Full Access
Question # 53

Which of the following is a broader risk specific to casinos and gambling?

A.

Low thresholds for transactions

B.

Frequent use of cash

C.

Cross-border transactions

D.

Weak KYC policies and procedures

Full Access
Question # 54

A national risk assessment (NRA) can impact the risk-based approach (RBA) within an organization's anti-financial crime (AFC) compliance program by: (Choose two.)

A.

helping to identify high-risk sectors that require enhanced due diligence (EDO),

B.

eliminating the need for sectoral risk assessments within the organization

C.

guiding the allocation of resources for mitigating financial crime risks

D.

requiring all organizations to apply standardized measures

E.

automatically reducing the organization's responsibility for conducting its own risk assessment

Full Access
Question # 55

A customer frequently deposits large amounts of cash into an online gambling account and requests withdrawals shortly after with minimal gambling activity.

What is the most likely money laundering risk associated with this behavior in the gambling and gaming industry?

A.

The customer is attempting to convert illicit funds into “clean” withdrawals

B.

The customer is attempting to avoid high fees by minimizing gambling activity

C.

The customer is testing the gaming platform’s payout system for potential fraud

D.

The customer is a high-risk gambler who regularly places large bets

Full Access
Question # 56

Ateam overseeing the governance and effectiveness of a bank’s transaction monitoring approachshould implement which strategies? (Select Two.)

A.

Periodic review of suspicious activity reports (SARs) filed with FinCEN to determine whether any should be withdrawn.

B.

Periodic and ad hoc cooperation with the legal team to appropriately investigate and monitor the transactions of subjects of subpoenas or government inquiries.

C.

Periodic review of client profiles to ensure that the most up-to-date information is on file for high-risk clients in line with the bank’s internal policies and procedures.

D.

Periodic review of the transaction monitoring scenarios and their productivity to ensure that appropriate AML typologies are reflected.

Full Access
Question # 57

Which of the following are included in the 11 Immediate Outcomes outlined in the Financial Action Task Force (FATF) methodology for assessing technical compliance with the FATF Recommendations and the effectiveness of AML/CFT/CPF systems during mutual evaluations? (Select Three.)

A.

International cooperation provides actionable information to use against criminals

B.

Those convicted of money laundering offenses are denied access to basic banking services

C.

Money laundering offenses are investigated and criminally prosecuted

D.

Financial intelligence information is collected by authorities and shared with the FATF for further investigation

E.

Supervisors regulate financial institutions and non-bank financial institutions and their risk-based AML/CFT programs

Full Access
Question # 58

The chief compliance officer (CCO) at a bank approved offering trade finance services to a company which is established within a country with a weak democratic system routinely reviews news on upcoming targeted economic sanction regulations in the EU, a major import partner for the country's production of crude oil.

Which of the following pieces of news would be of greatest concern?

A.

The European Commission and the High Representative issue a joint proposal for an import ban on refined oil products.

B.

The European Commission and the High Representative issue a joint proposal for an import ban on oil extraction equipment

C.

The Council of the European Union adopts a new export control regime for electronic equipment

D.

The Council of the European Union adopts a new import restriction regime for goods coming from countries that do not respect human rights

Full Access
Question # 59

An AML compliance officer is drafting plans to address deficiencies identified in an independent audit.

Which approach is the best option?

A.

Only commit to action plans that require no new investment to maximize shareholder value

B.

Draft action plans in consultation with the jurisdiction's FIU to remain aligned with other similar companies

C.

Only commit to action plans that can be implemented and closed within the three-month management reporting cycle

D.

Draft action plans to address the root cause of the deficiencies, regardless of how long they will take to fully implement

Full Access
Question # 60

A compliance officer is reviewing an institutional banking prospect proposal for a new foreign entity that is a multinational business but headquartered in a country where most businesses are state-owned.

Which risks should be prioritized in the review? (Choose two.)

A.

Politically exposed persons (PEPs)

B.

Capital flight risk

C.

Anti-bribery and corruption risk

D.

Tax evasion

Full Access
Question # 61

A bank in the Netherlands has been requested to share information about a series of transactions and related customers with a bank in Italy. Both banks are subject to European Union jurisdiction.

Which factor is the most important to consider before the Dutch bank shares the requested information with the Italian bank?

A.

The Dutch bank should limit any information sharing to what is necessary, reasonable, and proportionate, in line with applicable laws and regulations

B.

The Dutch bank's legal obligations to protect customer privacy and bank secrecy prohibit it from sharing any such information

C.

The Dutch bank should require a production order from the Italian bank and receive approval from its legal department before sharing the requested information

D.

The need to fight financial crime outweighs the EU's data protection and privacy regulations

Full Access
Question # 62

Reference data screening includes the screening of which types of datasets? (Select Two.)

A.

Types of payment messages

B.

Customers

C.

Third-party service providers

D.

Customer spouses

Full Access
Question # 63

A bank has been fined for failing to take reasonable care to establish and maintain effective systems and controls for high-risk customers, including politically exposed persons (PEPs).

Which typical financial crime risks should the bank have addressed? (Choose three.)

A.

Gathering sufficient information to establish the source of funds and source of wealth

B.

Assessing the level of money laundering risk posed by prospective and existing high-risk customers

C.

Assessing and reviewing the minutes of the relevant committee responsible for onboarding customers

D.

Ensuring an employee is responsible for liaison with the authorities on matters related to countering the finance of terrorism

E.

Ensuring that resources in its compliance and AML areas kept pace with the bank's growth

Full Access
Question # 64

In which of the following situations would it be most crucial for the designated AML compliance officer of a company to perform a complete review of the company's AML program, including identifying the risks and commensurate controls?

A.

An external audit highlights several deficiencies

B.

The company is merging with or acquiring another entity

C.

Extensive AML legislation is proposed by a legislative body in the company's jurisdiction

D.

A high-profile money laundering case involving another industry is publicized

Full Access
Question # 65

Which of the below would be relevant money laundering red flags for life insurance companies? (Select Two.)

A.

Paying premium several years in advance and terminating early for a refund

B.

Natural persons having more than one insurance policy

C.

High-premium life insurances that provide high payouts

D.

Regularly switching policies and accepting penalties

E.

Beneficiary payouts to elderly people

Full Access
Question # 66

Which changes at a financial institution (FI) should trigger an enterprise-wide reassessment of its inherent AML risk exposure? (Select Three.)

A.

Introduction of new products or services

B.

Mergers or acquisitions

C.

Restructuring of the FI's risk and compliance functions

D.

Use of new technologies for delivering existing products

E.

Changes in the individuals overseeing the FI's product lines and sales strategies

Full Access
Question # 67

At a high level, the risk assessment process involves identifying and rating the inherent risks associated with customers, products, countries, and delivery channels, and then:

A.

comparing these risks with industry benchmarks to determine the residual risk.

B.

implementing new controls to eliminate all risks

C.

rating the effectiveness of the related controls in order to calculate the residual risk.

D.

documenting the historical risk incidents for future reference.

Full Access
Question # 68

The transaction monitoring system of a bank generated an alert for a car wash client. After making large cash deposits, the client orders international wire transfers.

Which additional circumstances would make the case more suspicious?

A.

The beneficiary of the wire transfers is a foreign company whose shareholders and director are other companies

B.

The wire transfers are for different amounts but with the same beneficiary

C.

The beneficiary of the wire transfer is a resident of a grey-list country

D.

The beneficiary of the wire transfers is a resident of a foreign country bearing the same family name as the business owner

Full Access
Question # 69

An international bank is investigating a payment requested by one of its correspondent relationships that generated an alert in the automated transaction monitoring system. The payment originated from a corporation located in Hong Kong and the final beneficiary is an individual located in New York.

Which steps should the bank take first to address the alert? (Select Three.)

A.

Send a 314(b) request to the corporation's bank in Hong Kong

B.

Call the receiving individual to review identity verification documents

C.

Confirm that neither the beneficiary nor the originator are sanctioned parties

D.

Request supporting documents, including invoices and contracts to confirm the purpose of the payment

E.

Check for negative news in public sources on the sender and receiver

Full Access
Question # 70

Financial crime risk related to the use of "hawalas" can stem from: (Select Two.)

A.

difficulty in tracking the originator, recipient, and source of transactions.

B.

remote verification of identity by third-party program managers.

C.

heavy usage by senior political figures.

D.

informal networks used for cross-border transactions outside of the formal banking system.

E.

heightened risks of returned transactions.

Full Access
Question # 71

Which red flags apply to trade-based money laundering (TBML) schemes? (Choose three.)

A.

Use of wire transfers

B.

Loitering

C.

Instructions or involvement from third parties

D.

Amended letters of credit without reasonable justification

E.

Non-standard settlement arrangements

Full Access
Question # 72

An EU Trust and Company Service Provider analyst notices some unusual activity while looking through a customer's financial statements and detailed general ledger. The customer is in the business of importing and exporting machineries.

Which transaction indicator warrants further escalation to the compliance officer?

A.

The payment of company secretarial retainer fees to a foreign company in a tax-efficient jurisdiction

B.

The payment of virtual offices services overseas

C.

Inter-company loans from the holding company to the subsidiary company to finance the shipment of machinery

D.

The payment of consultancy fees to unrelated companies and service providers established in a foreign jurisdiction

Full Access
Question # 73

The new KYC lead at a bank is particularly focused on enhancing the risk management component of its KYC program and refers to the Basel Committee's customer due diligence (CDD) principles.

Which of the following describe key improvements to a KYC program established in the Basel Committee's CDD principles? (Select Two.)

A.

Implementation of a blacklist of correspondent customers with previously detected and investigated suspicious activity

B.

Enhancement of a customer acceptance policy to more clearly identify high-risk customers

C.

Increased frequency of training provided to front office employees

D.

Enhancement of customer identification procedures to appropriately identify trust, nominee, and fiduciary accounts

Full Access
Question # 74

Who bears the ultimate responsibility for approving a financial institution's relationship with a politically exposed person?

A.

KYC analyst

B.

Senior management

C.

Relationship manager

D.

Enhanced due diligence compliance officer

Full Access
Question # 75

Which of the following is a critical consideration for private sector firms when sharing data and intelligence to combat financial crime?

A.

The preference of upper management regarding which teams should participate in the data-sharing initiative

B.

The cost of the data-sharing system and whether it its within the existing IT budget

C.

The potential return on investment (ROI) from the data shared versus the financial crime prevention effort

D.

Ensuring that the shared data complies with applicable data protection regulations while maintaining the integrity and accuracy of the information

Full Access
Question # 76

Which suspicious activity may be the strongest indicator of money laundering through a casino?

A.

A privately held company originates funds transfers through the casino into the betting accounts of multiple patrons

B.

A patron requests the casino to transfer their winnings to another gambling operator

C.

A patron purchases a large amount of chips at a blackjack table using cash

D.

A patron routinely places multiple bets on the same sporting events

Full Access
Question # 77

Which of the following is a red flag indicating potential money laundering or terrorism financing through dealers of precious metals or high-value items?

A.

A customer wants to purchase gold bars with a combination of cash and cryptocurrency

B.

A customer specifically requests to purchase a Kimberly Process-certified cut diamond

C.

A customer pays an antique dealer with a credit card for a high-value antique item

D.

A customer wants a hand-written receipt for a cash purchase of a high-end, limited-edition luxury watch

Full Access
Question # 78

Which of the following entities could potentially pose a higher money laundering risk and require additional review prior to onboarding? (Select Two.)

A.

A large multinational corporation with extensive, documented wire transfer activity

B.

A local convenience store that replenishes the onsite automated teller machine (ATM) with cash from its till

C.

A local used car sale lot that allows individuals to pay their monthly bill in cash

D.

A virtual asset service provider (VASP), facilitating peer-to-peer cryptocurrency transactions

Full Access
Question # 79

A client advisor at a bank contacts a member of the compliance team for guidance on how to proceed with a client who wants to transfer US$250,000 from the sale of cryptoassets into their savings account at the bank.

What guidance should the compliance team provide?

A.

Advise further clarification is necessary, including which coins or tokens were sold and whether the crypto exchange conducts due diligence on its clients

B.

Advise that the transaction should be stopped because cryptoassets in general are not regulated and by definition pose an unacceptable AML risk for the bank

C.

Confirm to the advisor that the customer can proceed with the transaction if the client's KYC is up to date and a search on a public blockchain explorer does not provide any adverse media hits

D.

Confirm to the advisor that the customer can proceed with the transaction because clients are already correctly onboarded KYC is complete and the source of funds is transparent

Full Access
Question # 80

Unusual wire transfer transactions can include: (Choose two.)

A.

wire transfers in different currencies between accounts held at different banks for the same client.

B.

an incoming third-party wire transfer followed by the purchase of real estate in the client's name.

C.

an incoming wire transfer followed by the loan payment to a third party that is a business associate of the client.

D.

multiple wire transfers sent to counterparties associated with the client as per KYC documentation.

Full Access
Question # 81

One key aspect of promoting an enterprise-wide compliance culture within a financial institution is that the:

A.

Relevant information should be shared throughout the organization.

B.

Revenue-generating business sectors should have precedence over compliance.

C.

First line of defense should establish its own policies independently.

D.

Cost of compliance should increase proportionately to revenues.

Full Access
Question # 82

What should a financial institution (FI) do in response to a formal law enforcement request to produce documents?

A.

Keep senior management informed at all times to strategically organize a defense to terminate the law enforcement request

B.

Verify the officer's identification and ask for the law enforcement request to be served when the Chief Executive Officer is available to sign for it

C.

Ask for an extension to review the FI's privacy policy and confidentiality policy before providing any information under the law enforcement request

D.

Designate a person responsible for the internal investigation in preparation of documents for the request

Full Access
Question # 83

What areas of laws and regulations have the greatest impact on AML/CFT applications? (Choose three.)

A.

Information security, data privacy, and cybersecurity

B.

Foreign exchange control, and precious gemstone and metal dealing

C.

Ombudsman and anti-competition authority

D.

Electronic contract and biological signature acceptance

E.

Consumer protection, financial inclusion, and environmental, social and governance

Full Access
Question # 84

Which of the following conditions contribute to a politically exposed person (PEP) posing greater risk than a typical high-risk bank customer? (Select Two.)

A.

The family members and close associates of PEPs may be involved in illicit activities.

B.

PEPs are granted unlimited credit and financial immunity under international banking regulations.

C.

PEPs may exploit embassy activities to conceal bribery and corruption transactions.

D.

PEPs can have illegitimate fund sources but are legally protected from having their accounts closed for activities outside a bank's risk appetite.

Full Access
Question # 85

Which financial crime risks are inherent to e-commerce platforms? (Select Four.)

A.

E-commerce platforms exploited to move criminal proceeds

B.

Use of stolen bank cards for online purchases

C.

E-commerce platforms susceptible to fraud schemes

D.

E-commerce platforms used as a front for illicit transactions

E.

E-commerce platforms encouraging unregulated peer-to-peer lending

F.

Use of foreign currency to mask criminal proceeds

Full Access
Question # 86

A bank has joined a public-private partnership (PPP) to work with law enforcement and regulators on combating financial crime. However, the bank's data protection officer is concerned about sharing sensitive customer data, and the compliance officer is worried about potential delays in receiving useful information from the government.

Which of the following best describes a benefit of PPPs in fighting financial crime?

A.

PPPs improve financial crime detection and prevention by sharing intelligence between banks and law enforcement.

B.

PPPs help banks reduce compliance costs by automating information sharing.

C.

PPPs allow banks to manage their own suspicious activity report (SAR) filing process without the need to involve the Financial Intelligence Unit (FIU).

D.

PPPs maximize the efficiency of the bank's compliance program by providing real-time intelligence from law enforcement.

Full Access
Question # 87

The primary roles of a Country's Financial Intelligence Unit (FIU) include: (Select Two.)

A.

collaborating with law enforcement agencies, financial institutions, and other stakeholders to detect and prevent Illicit financial activities.

B.

conducting examinations of financial institutions to ensure compliance with anti-money laundering regulations.

C.

engaging in providing financial services, including banking and investment activities, to the public and private sectors

D.

facilitating the exchange of information between the public and private sectors.

E.

enacting legislation regarding the operations of financial institutions.

Full Access
Question # 88

Risks associated with real estate transactions include: (Choose two.)

A.

cross-border purchases

B.

purchases in the name of a natural person

C.

paying true market price for a property

D.

non-financed purchases

Full Access
Question # 89

The role of FATF-style regional bodies (FSRBs) is to; (Select Three.)

A.

identify and address the current financial crime trends through the issuance of typologies originating in members outside of their FSRB's Jurisdiction.

B.

provide AM L/C FT technical assistance needed by members in their FSRB junsdiction.

C.

coordinate technical assistance for members in their FSRB jurisdiction

D.

set and amend the FATF 40 Recommendations for members in their FSRB jurisdiction.

E.

identify and address any gaps in the AML/CFT policies for members outside of their FSRB jurisdiction.

F.

offer mutual evaluation and follow-up processes for members in their FSRB Jurisdiction.

Full Access
Question # 90

Which statement is the most accurate describing who must comply with Office of Foreign Assets Control (OFAC) sanctions?

A.

All US citizens and permanent residents while located in the US, all US incorporated entities and their foreign branches, and all individuals within the United States

B.

All US citizens and permanent residents regardless of where they are located, all US incorporated entities excluding their foreign branches, and all individuals and entities within the United States

C.

All US citizens except those with dual nationality, US permanent residents, all US incorporated entities, and all individuals within the United States

D.

All US citizens and permanent residents regardless of where they are located, all US incorporated entities and their foreign branches, and all individuals and entities within the United States

Full Access
Question # 91

Which of the following are key components of the Know Your Customer (KYC) process? (Select Two.)

A.

Inquiring about the source of wealth and source of funds

B.

Asking to provide a list of immediate family members

C.

Verifying the financial crime awareness of the client

D.

Collecting necessary documents to verify the veracity of information

Full Access
Question # 92

Common risks associated with cryptocurrency and convertible virtual currencies include: (Choose three.)

A.

funds being stolen from other users.

B.

obscuring the source of illicit funds.

C.

layering transactions to hide the origin of funds derived from illicit activity.

D.

difficulty converting into physical currency.

E.

facilitating payment for other illicit activities and goods.

Full Access
Question # 93

Which of the below statements are supported by the Financial Action Task Force (FATF) 40 Recommendations adopted in 2012? (Select Two.)

A.

Customer privacy regulations should guide the development of due diligence and other money laundering and terrorist financing preventive measures.

B.

Nations should work towards implementing targeted financial sanctions in alignment with the UN Security Council.

C.

Nations should take measures to ensure there is transparency to the beneficial ownership of legal persons.

D.

Nations should establish frameworks that take a risk-based approach to prevent and mitigate money laundering and terrorist financing.

E.

Governments must work toward developing identical administrative and operational frameworks for investigating and prosecuting crime.

F.

Regulators should direct Financial Institutions to establish appropriate frameworks to avoid banking higher risk customers.

Full Access