Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ACAMS > AML Certifications > CAMS

CAMS Certified Anti-Money Laundering Specialist (CAMS7 the 7th edition) Question and Answers

Question # 4

A compliance officer at a financial institution (FI) is reviewing a new client application for a virtual asset service provider (VASP).

Which details should be part of the risk assessment to determine whether the customer falls within the FI’s financial crimes risk appetite? (Select Three.)

A.

Whether the VASP’s procedures are sufficient for protecting client personally identifiable information

B.

What percentage of the VASP’s clients are classified as higher-risk

C.

Which registered institutions act on behalf of the VASP as operators of virtual asset wallets and virtual asset exchange offices

D.

Whether the VASP is utilizing central bank digital currencies

E.

Who the VASP’s clients are, including the breakdown of foreign and domestic individuals

Full Access
Question # 5

Which section of the USA PATRIOT Act relates to forfeiture of funds and allows for extraterritorial reach?

A.

Section 319(b)

B.

Section 314(b)

C.

Section 314(a)

D.

Section 319(a)

Full Access
Question # 6

What is the first step in designing an effective controls framework using a risk-based approach?

A.

Establishing risk controls

B.

Assessing risk controls

C.

Ongoing risk monitoring

D.

Conducting a risk assessment

Full Access
Question # 7

The compliance officer at an EU bank is investigating one of the customer accounts maintained with the bank for the last two years. According to bank records, the company's primary economic activity is import and export of petrochemical products Over a period of one year, the account transactions have exceeded US$500 million with various high-value inward wire transfers received from suppliers in Yemen followed by outward wire transfers to counterparties in Azerbaijan.

Which factor should give the compliance officer the greatest concern If observed in the investigation?

A.

Media searches reveal a report that the customer was accused of misconduct three years ago.

B.

The EU bank considers the origin and destination countries Involved in the transactions to be high-risk.

C.

The customer's activity includes multiple cross-border transactions involving various counterparties.

D.

The EU bank received no originator or beneficiary information for the wire transfers.

E.

The customer specializes in the import and export of petrochemical products.

Full Access
Question # 8

A periodic review has been completed for an existing virtual asset service provider (VASP) customer.

Which of the following are indicators of potential money laundering? (Select Three.)

A.

Use of shell companies for deposits and withdrawals into the VASP

B.

Using a peer-to-peer network to reduce costs associated with server maintenance and data storage

C.

Rapid market fluctuations resulting in quick changes in the value of underlying assets

D.

Frequent use of mixers and tumblers for holdings and transactions

E.

Receiving funds from countries known for weak money laundering regulations and frameworks

Full Access
Question # 9

Which of the following are included in the 11 Immediate Outcomes outlined in the Financial Action Task Force (FATF) methodology for assessing technical compliance with the FATF Recommendations and the effectiveness of AML/CFT/CPF systems during mutual evaluations? (Select Three.)

A.

International cooperation provides actionable information to use against criminals

B.

Those convicted of money laundering offenses are denied access to basic banking services

C.

Money laundering offenses are investigated and criminally prosecuted

D.

Financial intelligence information is collected by authorities and shared with the FATF for further investigation

E.

Supervisors regulate financial institutions and non-bank financial institutions and their risk-based AML/CFT programs

Full Access
Question # 10

How should risk-related issues be addressed to ensure the effectiveness of the three lines of defense model?

A.

Ensure that the second line reviews, monitors, and escalates risk-related issues as needed to senior management while maintaining independent oversight from the third line

B.

Have senior management handle risk-related issues directly when possible because they are ultimately responsible for the organisation's overall risk management strategy

C.

Delegate some risk-related issues to the first line to avoid overwhelming the second line and to ensure operational efficiency

D.

Assign risk-related oversight duties to the third line to provide an independent review and address issues more effectively by avoiding conflicts of interest in the first and second lines

Full Access
Question # 11

A financial institution plans to implement adverse media screening with Artificial Intelligence (AI)/Machine Learning (ML) capabilities During testing, the system produces high volumes of irrelevant news articles for review.

What is the best way to address this issue?

A.

Narrow the media sources to avoid unrelated articles

B.

Rely on manual filtering by investigators

C.

Increase the frequency of updates to media sources

D.

Adjust AI/ML models to focus on high-risk keywords/phrases from reputable media sources

Full Access
Question # 12

Which characteristics of trust and company service providers (TCSPs) can potentially make them vulnerable to financial crime? (Select Three.)

A.

They may market themselves specifically to criminals

B.

Offering nominee directors may increase anonymity by concealing true ownership

C.

They do not have to comply with AML regulations in most jurisdictions

D.

Selling ready-made, off-the-shelf companies to offshore intermediaries

E.

Having minimal face-to-face contact with customers, particularly in offshore arrangements

Full Access
Question # 13

An institution is looking to alter an existing threshold-based monitoring scenario because it is generating too many alerts that do not yield suspicious activity reports.

Documentation submitted to the relevant committee for supporting this proposal should include details on: (Choose three.)

A.

evidence that the increased residual risk arising from the change is within the bank's risk appetite.

B.

approval by money-laundering reporting officer for the proposal.

C.

how many resources are spent on the less productive lower threshold and the associated costs.

D.

the number of cases that will not be filed and the resources that can be freed up for other tasks.

E.

minutes of meeting held with the regulator where agreement was obtained that the higher threshold was justified.

F.

historical analysis proving that the current scenario generates a disproportionate number of false positives.

Full Access
Question # 14

Which of the following measures can help maintain the independence of BSA/AML compliance staff to ensure effective compliance controls?

A.

Establishing BSA/AML compliance staff reporting to the management of the business line in the first line of defense

B.

Ensuring BSA/AML compliance staff is primarily outsourced

C.

Providing BSA/AML compliance staff a reporting line to compliance or other second line of defense internal control function

D.

Providing BSA/AML compliance staff with a reporting line to the chief financial officer

Full Access
Question # 15

Money services businesses (MSBs), payment service providers, and e-commerce platforms usually have a high volume of daily transactions.

What are the risks associated with these types of businesses? (Choose two.)

A.

These businesses are all cash intensive, increasing the risk of financial crime

B.

KYC challenges arise because e-commerce platforms face global customers making customer due diligence complex and resource intensive

C.

These businesses are highly regulated and therefore have no reason to be non-compliant as this would put them at risk of sanctions and fines

D.

Criminals can make use of identify fraud to fulfill KYC processes for layering purposes

E.

The settlement systems of these businesses are not sophisticated enough to cope with the high transaction volume

Full Access
Question # 16

Which of the following are AML risks associated with onboarding a high-risk customer? (Select Two.)

A.

Enhanced customer due diligence requirements

B.

Greater potential for laundering illicit proceeds

C.

Reduced regulatory scrutiny compared to low-risk customers

D.

Increased likelihood of engaging in financial crimes

Full Access
Question # 17

The chief compliance officer at a global bank that operates in the US, EU, and other countries is responsible for navigating the US and EU regulations related to anti-money laundering (AML) and sanctions as well as any local regulations in the countries where it operates.

What should be the primary compliance concern of the bank?

A.

US anti-money laundering regulations are stricter than the EU AML Directives, making it easier for the global bank to be compliant in the EU

B.

US and EU regulations require the bank to build separate compliance teams, making it necessary to establish completely separate systems for US and EU operations

C.

The EU's sanctions regime is stricter than that of the US Office of Foreign Assets Control (OFAC), so the bank must prioritize compliance with EU regulations over US laws and train the staff in Europe accordingly

D.

Balancing compliance with the US BSA and OFAC sanctions while ensuring adherence to EU AML directives and the GDPR, which complicates cross-border data sharing

Full Access
Question # 18

Which statement about the extraterritorial reach of US laws and legislation is accurate?

A.

The Bank Secrecy Act (BSA) extraterritorial reach requires that the Travel Rule be applied to all financial institutions globally, including all USD transactions

B.

The Anti-Money Laundering Act of 2020 (AML Act) extraterritorial reach covers all USD transactions throughout the global economy

C.

The Office of Foreign Assets Control's (OFAC's) economic and trade sanctions may pose extraterritorial risks for financial institutions and businesses outside of the US

D.

Section 319(b) of the USA PATRIOT Act extraterritorial reach permits the seizure of funds from a correspondent bank account in the US that have been opened and maintained for the foreign bank

Full Access
Question # 19

At a high level, the risk assessment process involves identifying and rating the inherent risks associated with customers, products, countries, and delivery channels, and then:

A.

comparing these risks with industry benchmarks to determine the residual risk.

B.

implementing new controls to eliminate all risks

C.

rating the effectiveness of the related controls in order to calculate the residual risk.

D.

documenting the historical risk incidents for future reference.

Full Access
Question # 20

Which of the following are considered best practices for effective AML/CFT training programs? (Select Three.)

A.

Training should cover practical examples, use case studies, and provide information on how to comply with policies.

B.

Up-to-date records including logs of training and completion dates should be maintained.

C.

Training should be broad, high level, and not role-specific in order to reach the largest audience.

D.

Training should cover the consequences of not complying with policies and procedures.

E.

Training should always be provided by an independent third party.

Full Access
Question # 21

A sound AML compliance program requires a comprehensive governance framework that addresses key elements to ensure the integrity of the financial system.

Which element forms the starting point of an effective AML compliance program?

A.

Ongoing monitoring

B.

Risk assessment

C.

Policies and procedures

D.

Suspicious activity reporting

E.

Customer due diligence

Full Access
Question # 22

Which of the following are potential financial crime-related red flags when obtaining client data? (Choose three.)

A.

A client frequently submits financial statements much earlier than required appearing overly eager

B.

A client insists on using a personal bank account for business transactions despite being advised otherwise

C.

A new client shows a preference for minimal direct interaction and relies primarily on indirect communication methods, citing convenience or time constraints

D.

The client is a publicly listed company but very diversified

E.

The ultimate beneficial ownership is unclear

Full Access
Question # 23

The primary roles of a Country's Financial Intelligence Unit (FIU) include: (Select Two.)

A.

collaborating with law enforcement agencies, financial institutions, and other stakeholders to detect and prevent Illicit financial activities.

B.

conducting examinations of financial institutions to ensure compliance with anti-money laundering regulations.

C.

engaging in providing financial services, including banking and investment activities, to the public and private sectors

D.

facilitating the exchange of information between the public and private sectors.

E.

enacting legislation regarding the operations of financial institutions.

Full Access
Question # 24

Interactions between the compliance department and other functions or departments within an organization contribute to making the anti-financial crime (AFC) compliance program more robust by addressing specific risk areas.

Which departments play a crucial role in enhancing the AFC compliance program of an organization? (Select Two.)

A.

Information security office (ISO)

B.

Marketing and sales

C.

Human resources (HR)

D.

Data privacy office (DPO)

Full Access
Question # 25

According to the Basel Committee principles, which actions would make a customer identification program at a bank more robust? (Select Two.)

A.

Understanding why a customer has selected a particular financial institution for banking

B.

Verifying the identity of a customer with reputable online source documentation

C.

Limiting the online activities of a new customer during the first two months

D.

Understanding the nature and purpose behind a new business opening an account at the bank

Full Access
Question # 26

A key advantage of privacy enhancing technologies (PETs) in anti-money laundering is that they offer:

A.

simultaneous encryption and decryption for underlying data.

B.

full access to underlying data with full and uninterrupted calculations made on the data.

C.

secure processing of data while it remains encrypted.

D.

transfer, decryption and storage of data by the data processor.

Full Access
Question # 27

An employee at a financial institution (Fl) suspects that one of their co-workers is involved in a financial investment scam syndicate. Which step should be taken next by the employee who has the suspicion?

A.

Question their co-worker to determine If their suspicions are correct before reporting to the Fl's Human Resources department

B.

Use the Fl's whistle blowing channel to report the suspected employee

C.

Warn colleagues and customers of the F1 that the employee's suspicious financial investment proposals could be a scam

D.

Conduct an open-source intelligence investigation using artificial intelligence tools to gain more information on the activities of the suspected employee

E.

Report the suspected employee to the line manager of the F1 to take the required action

Full Access
Question # 28

The financial industry relies heavily on rules-based approaches to transaction monitoring to detect suspicious activities.

Scenario-based systems use technology and algorithms to identify: (Choose three.)

A.

fraudulent identities involving stolen or manufactured identification.

B.

suspicious behavior involving a transaction that occurs at an unusual time of day.

C.

hidden beneficial owners.

D.

transaction patterns involving transactions that exceed a certain dollar amount.

E.

anomalies involving a transaction that occurs in a location far away from the customer's usual spending patterns.

Full Access
Question # 29

A robust transaction monitoring system includes the capability to:

A.

Monitor transactions and identify anomalies that might indicate suspicious activity

B.

Automatically translate documents

C.

Integrate social media profiles

D.

File Suspicious Activity Reports (SARs), Currency Transaction Reports (CTRs), and other regulatory reports

Full Access
Question # 30

An insurance company receives an application for a high-value life insurance policy from a new non-resident client. The payout instruction is linked to an offshore trust in another jurisdiction to which the client has no obvious connection. The client insists on paying premiums via multiple transactions to “avoid bank charges.” The client is reportedly unemployed with minimal assets, which is inconsistent with the policy value.

Which financial crime risk should the insurance company be most concerned with?

A.

Sanctions evasion

B.

Money laundering

C.

Fraud

D.

Market abuse

Full Access
Question # 31

An organization is developing a comprehensive anti-money laundering (AML) framework.

Which of the following statements best describes the relationship between AML policies and procedures?

A.

Policies are broad guidelines. Procedures are detailed instructions for specific processes. Only procedures are mandatory for knowledge and adherence.

B.

Policies define the principles of an organization and influence the drafting of procedures. Procedures are detailed instructions for specific processes.

C.

Policies are detailed instructions for specific processes. Procedures are an overarching framework. Neither policies nor procedures are mandatory for knowledge and adherence.

D.

Policies are detailed instructions for specific processes. Procedures are an overarching framework. Both policies and procedures are mandatory for knowledge and adherence.

Full Access
Question # 32

Which of the following are red flags pertaining to potentially suspicious transactions by a customer? (Select Three.)

A.

A customer deposits a large number of consecutively numbered money orders.

B.

A customer requests loans made to local companies or secured by obligations of local banks.

C.

A customer has regular deposits and withdrawals primarily in wire transfers.

D.

A customer receives wire transfers from different unknown accounts which are immediately wired onwards to a third party.

E.

A customer withdraws cash in amounts just under the reporting threshold.

Full Access
Question # 33

When implementing a customer screening system to detect possible sanctions evasion at a financial institution (FI), which of the following requirements should be considered to ensure effective list management? (Select Two.)

A.

Only specific individuals should be allowed to modify the lists

B.

Only regulatory lists should be used, including those of the Office of Foreign Assets Control (OFAC) and the EU

C.

Lists can be created internally or purchased from a vendor

D.

All lists should be used for screening in all jurisdictions

Full Access
Question # 34

An oil exploration company based in France does business with oil refineries in Iran, which is subject to comprehensive Office of Foreign Assets Control (OFAC) sanctions.

What type of OFAC sanctions should be imposed against the French company?

A.

List-based

B.

Secondary

C.

Country-based

D.

Sectoral

Full Access
Question # 35

How do nominees benefit criminals misusing thorn for money laundering purposes? (Select Two.)

A.

Allow beneficial owners to provide proxies lot voting on corporate decisions

B.

Obscure beneficial ownership

C.

Allow domicile in the nominee's jurisdiction

D.

Derail investigations

Full Access
Question # 36

Why is it important to use multiple sanctions lists, such as United Nations (UN), Office of Foreign Assets Control ("OFAC"), and European Union ("EU") lists, in name screening systems?

A.

To avoid sanctions breach related to payments

B.

To avoid onboarding customers previously exited due to true match

C.

To meet international regulatory requirements and identify risks across jurisdictions

D.

To be in line with the risk appetite statement

Full Access
Question # 37

An AML analyst at a bank is investigating cases triggered by transaction monitoring alerts.

Which circumstances might cause the analyst to suspect a case involves terrorist financing? (Select Two.)

A.

Transactions involving non-profit organizations with no internet presence

B.

Small dollar payments sent to crowdfunding initiatives with detailed descriptions of the project being financed

C.

Transactions involving structured currency deposits below the reporting threshold to avoid paying taxes

D.

Small dollar payments sent to higher-risk jurisdictions with no prior history

E.

Transactions involving domestic non-profit organizations providing charitable aid to refugees from higher-risk countries

Full Access
Question # 38

A financial institution's transaction monitoring system flags an unusually high volume of international wire transfers originating from a small business account. The transfers are being sent to multiple jurisdictions known for limited regulatory oversight. Additionally, an employee reports suspicious behavior from the account holder during an in-person visit, where they requested a large cash withdrawal without providing a clear business justification. As part of the investigation, the compliance team must assess whether this activity is suspicious and determine the appropriate next steps.

Which of the following steps should be taken first in the investigation process to properly gather information and assess whether the transactions are suspicious?

A.

Review the transaction history of the account to identify patterns, including the frequency, destination, and purpose of the wire transfers

B.

Notify senior management and suggest account closure due to potential risks

C.

Immediately file a suspicious activity report (SAR) based on the employee's report of suspicious behavior

D.

Contact the customer directly to ask for clarification on the reason for the large cash withdrawal

Full Access
Question # 39

Which risks inherent to real estate sector carry the highest AML/CFT risk? (Select Two.)

A.

Use of cash to purchase property

B.

Unlicensed real estate agents acting as front companies

C.

Use of a registered trust for the purchase of property

D.

Use of a company for the purchase of property

E.

Manipulation of the value of a property

Full Access
Question # 40

The United Nations Security Council’s sanctions are intended to be:

A.

Encompassing and broad, including the use of force if necessary

B.

Designed to maintain and restore international peace and security

C.

Indefinite to produce economic benefit for a group of states

D.

Punitive to influence foreign governments to change their behavior

Full Access
Question # 41

Which key performance indicators (KPIs) should be considered in the context of ML/TF transaction monitoring? (Select Three.)

A.

Number of days required to hire new staff

B.

Number of alerts raised for review or reporting

C.

Number of alerts by region

D.

Number of transactions by top customers

E.

Average time to review an alert

Full Access
Question # 42

Which of the following AML/CFT arrangements should a bank have in place at minimum before opening for business? (Choose three.)

A.

Independent compliance testing

B.

Qualified and knowledgeable staff

C.

Third-party screening software

D.

An automated monitoring system

E.

Written policy and procedures

Full Access
Question # 43

Which of the services provided by Trust and Company Service Providers (TCSPs) present the greatest financial crime risks? (Choose three.)

A.

Providing clear procedures to ensure compliance with local tax regulations

B.

Using trusts to obscure the identity of beneficial owners

C.

Promoting the use of complex corporate structures

D.

Maintaining accurate and updated beneficial ownership details for all customers registered for their services

E.

Establishing shell companies for holding financial assets

Full Access
Question # 44

Which of the following is an important factor to consider when setting up an anti-financial crimes (AFC) compliance program governance structure?

A.

Ensuring the structure is reviewed by an outside auditor or consultant

B.

Establishing a system of internal controls commensurate with the institution’s size and complexity

C.

Designating a qualified board of directors to monitor day-to-day compliance

D.

Establishing clear roles and responsibilities for AFC risk escalations and issues

Full Access
Question # 45

Which statement regarding data privacy is the most accurate in the context of AML investigations?

A.

Organizations are required to demonstrate that customers have opted into information sharing before submitting suspicious activity reports to relevant financial intelligence units (FIUs)

B.

Any customer that is the subject of a suspicious report filing has the right to request redaction of their personal data

C.

FIUs should document purposes for which personal data included on suspicious activity reports may be shared with other agencies

D.

Data privacy laws prohibit information sharing between financial institutions for the purposes of AML investigations in all jurisdictions

Full Access
Question # 46

From an international standards perspective both the EU and Financial Action Task Force (FATF) consider data sharing a crucial component of effective anti-money laundenng measures because data sharing:

A.

allows Financial Intelligence Units (FlUs) to enact sanctions against perpetrators of financial crime

B.

promotes financial transparency and protects the integrity of the financial systems

C.

needs to be approved by the Financial Intelligence Unit (FIU) before sharing between financial institutions

D.

helps financial institutions to be more effective in fighting crime with data analysis

Full Access
Question # 47

A law enforcement agency submits several requests to a financial institution.

Which request is legitimate and requires the bank to respond?

A.

Keep an account open upon verbal request

B.

Produce documents and testimony without a subpoena

C.

Seize privileged documents upon written request

D.

Freeze an account in terms of a court order

Full Access
Question # 48

Which situation involving a vendor presents increased AML and/or sanctions risk to an organization?

A.

The vendor provides services to end users located in an area subject to economic sanctions

B.

The vendor's sales representative was a refugee from a sanctioned jurisdiction as a child

C.

The vendor is organized as a privately held company

D.

The vendor has no individuals that own or control more than 10% of the company

Full Access
Question # 49

Technology has the potential to increase the efficiency and effectiveness of AML/CFT workflows by: (Select Two.)

A.

Eliminating backlogs through the ability to process large volumes of data

B.

Minimizing privacy concerns through minimized human intervention

C.

Minimizing human intervention in repetitive tasks, increasing data accuracy

D.

Allowing for automatic one-stop searches at the front end by analysts

Full Access
Question # 50

A financial institution is exploring automation to assist investigators in reviewing flagged transactions. Currently, investigators spend a significant amount of time gathering data from multiple sources.

Which of the following automation features would be most effective in improving investigator efficiency?

A.

Pre-populated templates for SAR filing

B.

Integration of open-source tools to gather real-time intelligence

C.

Automated case prioritization based on risk scoring

D.

AI-powered dashboards summarizing flagged transactions

Full Access
Question # 51

The effectiveness of AML/CFT measures can be best measured by the extent to which systems and controls:

A.

Comply with relevant laws and regulations

B.

Minimize operational burden placed on the financial institution

C.

Mitigate the risks and threats of financial crime

D.

Are implemented in a cost-effective way

Full Access
Question # 52

Financial Intelligence Units (FIUs) help to protect financial integrity by: (Select Two.)

A.

Receiving and analyzing Suspicious Activity Reports (SARs) to detect financial crime

B.

Disseminating information on emerging trends related to money laundering and associated predicate offenses

C.

Assisting financial institutions with designing products and services that lower residual money laundering risk

D.

Ensuring financial institutions maintain appropriate AML programs commensurate with their risk profiles

Full Access
Question # 53

A compliance analyst has recently investigated an account where money was deposited in amounts below the reporting limit and almost entirely withdrawn in a foreign country.

Which type of money laundering is the compliance analyst potentially identifying?

A.

Trade-based

B.

Check Kiting

C.

Microstructuring

D.

Structuring

Full Access
Question # 54

The UN Security Council's primary role in imposing sanctions is that it has the authority to:

A.

impose sanctions lo maintain of restore international peace and security

B.

impose sanctions on countries that lack AML/CFT controls.

C.

conduct research on and analyze the impacts of sanctions to improve the effectiveness of sanctions regimes.

D.

impose sanctions on economic targets to maintain or restore financial stability within a country.

Full Access
Question # 55

Which techniques would be most efficient for a complex investigation of unusual patterns of activity involving multiple businesses, triggered by an automated monitoring system alert? (Select Two.)

A.

Perform a control and ownership assessment of the businesses involved, using the information available in the client files

B.

Contact local law enforcement and request that they assist in the analysis and investigation

C.

Review the information presented in the automated monitoring system's alert description and decline any future transactions

D.

Contact the account manager and ask for the reasons behind the patterns of activity highlighted in the AML alerts

E.

Use social media platforms to connect with the businesses and request details about the account activity

Full Access
Question # 56

What is the relationship between the EU Anti-money Laundering Directives (AMLD) and local anti-money laundering (AML) regulations in European Union (EU) member states, in terms of their relevance for, applicability to, and impact on EU banks? (Select Two.)

A.

The EU AMLD and local AML regulations are separate and unrelated legal frameworks.

B.

The EU AMLD and local AML regulations must have identical requirements.

C.

Local AML regulations may impose additional or more stringent requirements than the EU AMLD.

D.

The EU AMLD take precedence over local AML regulations.

E.

Local AML laws and regulations override the requirements of the EU AMLD.

F.

The EU AMLD provide a framework that member countries must implement through local AML regulations.

Full Access
Question # 57

Which risk factors should a financial institution (FI) examine for a new corporate customer intending to open a new bank account? (Select Three.)

A.

All the financial institutions where the new customer currently banks or banked previously

B.

The type of business the corporate customer is engaged in

C.

The employment profiles and information of all employees of the new customer

D.

The country or location where the customer is from or conducts business

E.

The identity of senior managing officials and all individuals authorized to operate the account

Full Access
Question # 58

Which of the following statements is true regarding using an artificial intelligence (AI)-based system to review and identify applicable privacy and data protection rules?

A.

Generated results will still have to be assessed for the completeness and applicability of the identified rules

B.

Training should focus on the rules used and not how the AI performs its function

C.

Generated results are likely to be accurate and valid because of the large number of rules analyzed

D.

AI may be ineffective because it cannot be trained to identify rules applicable to a specific bank

Full Access
Question # 59

According to Basel Committee guidelines, which level of the organization should determine whether or not to enter business relationships with higher risk customers?

A.

Account opening staff

B.

Middle management

C.

Senior management

D.

First-level management

Full Access
Question # 60

Which of the following best describes the degree of cooperation between regulatory authorities, law enforcement agencies, and Financial Intelligence Units (FIUs) during money laundering investigations, including cross-border cases?

A.

Regulatory authorities primarily work independently but share information when requested by international law enforcement agencies.

B.

FIUs primarily handle reporting from financial institutions, while regulatory authorities and law enforcement agencies are limited to enforcing domestic AML laws without international cooperation.

C.

Law enforcement agencies and FIUs only cooperate during domestic investigations, leaving cross-border investigations to international organizations like INTERPOL.

D.

Regulatory authorities, law enforcement agencies, and FIUs share intelligence and coordinate efforts to streamline cross-border money laundering investigations, often through formal agreements.

Full Access
Question # 61

Which of the following is a key consideration for a global organization when managing AFC and sanctions compliance across multiple jurisdictions?

A.

Ensuring sanctions compliance by relying solely on international bodies like the UN because there is no requirement to adhere to local laws

B.

Ensuring group policies and procedures prioritize adherence to US regulations because they are the most influential worldwide

C.

Applying global AFC and sanctions policies to ensure consistency without the need to adapt to local regulations

D.

Ensuring group policies cater to compliance with each country's specific AML and sanctions regulations

Full Access
Question # 62

A financial institution has received complaints about friction in the onboarding process when additional information is requested.

Which potential solutions could help ensure a better customer onboarding experience with reduced friction? (Select Two.)

A.

Implement internal or external tools that streamline onboarding processes

B.

Implement new processes only once every three years to ensure consistency

C.

Ensure consistent training of all employees on new processes, policies, and tools

D.

Ensure that only team leads or managers have decision-making power

Full Access
Question # 63

Which of the following scenarios warrants enhanced due diligence (EDD)? (Select Three.)

A.

An existing local league footballer trying to open a bank account with a bank in their local jurisdiction

B.

The current prime minister of a country trying to open a bank account in another country

C.

The former personal secretary to the minister of transport in a low-risk country 25 years ago opening a bank account at a bank in a neighboring low-risk country

D.

A bank located in a higher risk country trying to establish a correspondent-respondent banking relationship with a bank in a lower-risk country

E.

An individual with a current bank account who resides in one country becoming the ambassador of another country

Full Access
Question # 64

A Financial Intelligence Unit (FIU) serves as a national center for the receipt and analysis of suspicious activity reports (SARs) and can obtain additional information from other reporting entities relevant to:

A.

public administration.

B.

legal assessment.

C.

law enforcement.

D.

legal activity.

Full Access
Question # 65

A national risk assessment (NRA) can impact the risk-based approach (RBA) within an organization's anti-financial crime (AFC) compliance program by: (Choose two.)

A.

helping to identify high-risk sectors that require enhanced due diligence (EDO),

B.

eliminating the need for sectoral risk assessments within the organization

C.

guiding the allocation of resources for mitigating financial crime risks

D.

requiring all organizations to apply standardized measures

E.

automatically reducing the organization's responsibility for conducting its own risk assessment

Full Access
Question # 66

Which of the following describes a formal method of information sharing and cooperation between Financial Intelligence Units (FIUs) when conducting cross-border money laundering investigations?

A.

FATF, MONEYVAL, and other regional bodies acting as a contact point for FIUs

B.

The Wolfsberg Group serving as a communication platform for FIUs

C.

Memoranda of Understanding (MOUs) between FIUs establishing structured information sharing

D.

Mutual Legal Assistance Treaties (MLATs) allowing FIUs to request arrests and evidence

Full Access
Question # 67

An AML analyst at a financial institution is examining an alert generated by the automated transaction monitoring system to determine whether the alert should be escalated to the AML unit for further investigation or whether it can be archived as a false positive.

Which action might be reasonable for the AML analyst to take?

A.

Restrict the client's access to the account

B.

Request information from the relationship manager assigned to the account that caused the alert

C.

Perform below-the-line testing to ensure the automated monitoring system is operating effectively

D.

Send a request for information to the counterparty bank involved in the transaction that caused the alert

Full Access
Question # 68

A trust and company services provider that offers a variety of services to businesses is approached by a client interested in establishing a new company. The client requests assistance with the incorporation process, a local business address, annual maintenance services, and the designation of individuals to serve in official capacities for the new company.

Which of the following services involves a higher money laundering risk?

A.

Appointing individuals to serve in official capacities of the company

B.

Annual maintenance services

C.

Provision of a local business address

D.

Company incorporation services

Full Access
Question # 69

The compliance department of a casino is reviewing recent transactions and has identified activities that may require further scrutiny.

Which transaction would require further investigation?

A.

A patron who regularly visits the casino, deposits small amounts of cash, and consistently requests to cash out winnings in high-value checks

B.

A group of tourists who buy chips with credit cards and engage in high-stakes games before cashing out

C.

A player who purchases USD 50,000 in chips using a combination of cash and a wire transfer from an international account, does not gamble, and then cashes out

D.

An occasional visitor who plays low-stakes games using a prepaid debit card linked to a foreign account

Full Access
Question # 70

Which of the following is a red flag indicating potential money laundering or terrorism financing through dealers of precious metals or high-value items?

A.

A customer wants to purchase gold bars with a combination of cash and cryptocurrency

B.

A customer specifically requests to purchase a Kimberly Process-certified cut diamond

C.

A customer pays an antique dealer with a credit card for a high-value antique item

D.

A customer wants a hand-written receipt for a cash purchase of a high-end, limited-edition luxury watch

Full Access
Question # 71

An agent of a wealthy individual residing in Country A, which is on the EU list of high-risk third jurisdictions, approaches a notary in Country B, which is in the EU. The agent wants to complete a disposal of assets recently acquired at auction by the wealthy individual through an offshore company. The agent also has a power of attorney to act on behalf of the offshore company issued by a respectable law firm from Country C, which is also in the EU. The agent asks the notary to proceed with the disposal as quickly as possible without paying any specific attention to related costs or taxes to be paid as a result of this transaction. The notary notices the intended transfer price is significantly lower than the one recorded at auction, but the agent does not want to discuss this matter and claims that it is not covered by the power of attorney.

Which red flags should the notary consider? (Select Two)

A.

The agent requested a disposal of assets at a lower price than recently acquired.

B.

The assets acquired through an auction were put in the name of an offshore company

C.

The agent acted on behalf of an individual residing in a country which is on the EU's list of high-risk jurisdictions

D.

The power of attorney was issued by a law firm in a different EU country from where the transaction took place.

Full Access
Question # 72

Which operational situation might indicate that money laundering is occurring at or through a deposit-taking financial institution?

A.

The institution has observed an increase in customer demand for large-denomination banknotes.

B.

The institution maintains a sequentially numbered log of the monetary instruments it sells.

C.

The institution has observed a reduced settlement time in the transaction services that support the rapid movement or remittance of funds.

D.

The institution has observed an increase in the adoption of its digital products and services.

Full Access
Question # 73

Which key metric would provide the most valuable data to the senior management of a financial institution about the effectiveness of its AML controls?

A.

The ratio of true positives to false positives generated by the automated monitoring system

B.

The number of money laundering alerts generated by the watchlist screening system

C.

The number of high-risk customers onboarded each month

D.

The number of clients exited for commercial reasons

Full Access
Question # 74

A bank organized under foreign law and located outside of the US maintains a correspondent banking relationship with a US-based bank to handle financial transactions in US dollars for its clients. In compliance with the USA PATRIOT Act of 2001, all US banks and broker-dealers in securities must obtain a signed certification from all non-US foreign bank clients conducting business with them.

What information does the USA PATRIOT Act of 2001 require the foreign bank to certify to the US bank? (Select Three.)

A.

The foreign bank will not allow indirect use of the correspondent bank accounts by Politically Exposed Persons (PEPs)

B.

The jurisdictions in which the foreign bank maintains a physical presence

C.

The foreign bank's operations will be limited to the country of incorporation

D.

The ownership details of the foreign bank

E.

The foreign bank will not allow indirect use of the correspondent bank accounts by shell banks

Full Access
Question # 75

Which of the following describes a role of the Financial Action Task Force (FATF)?

A.

Oversight of the Financial Intelligence Units in FATF Member countries

B.

Providing a unique platform for information exchange regarding anti-money laundering efforts

C.

Regulation of financial markets through directives and executive orders

D.

Enhancement of international cooperation to foster anti-money laundering efforts via recommendations and guidance

Full Access
Question # 76

How can public-private partnerships (PPPs) foster collaboration in the fight against financial crime? (Choose two.)

A.

Developing a culture of compliance

B.

Improving governance in the public sector by requesting feedback from financial institutions

C.

Reducing transaction monitoring false positives for all financial institutions

D.

Improving the quality and quantity of data available for analysis by sharing information

Full Access
Question # 77

Money services business (MSB) customers present the greatest financial crime risks to mitigate if they: (Select Two.)

A.

Process the activity of a customer’s customer

B.

Conduct a large volume of low-value transactions

C.

Require registration

D.

Often send cross-border transfers

Full Access
Question # 78

Which of the following are benefits of the latest KYC solutions, including but not limited to digital onboarding, eKYC, digital identity, facial recognition, liveness checks, biometrics, and geolocation? (Choose three.)

A.

Guaranteeing 100% accuracy in regulatory compliance across all jurisdictions

B.

Improving customer satisfaction by offering personalized recommendations

C.

Reducing identity theft effectively

D.

Providing reliable customer authentication to enhance trust

E.

Decreasing the time required for customer authentication

Full Access
Question # 79

The Basel Committee on Banking Supervision published guidelines on the "Sound management of risks related to money laundering and financing of terrorism."

With regard to identifying and accepting customers, it recommends that banks: (Select Two.)

A.

Establish policies and procedures to ensure due diligence activities are identical for all customers.

B.

Establish policies and procedures to identify and verify customers, beneficial owners, and any individuals that can transact on behalf of their customers.

C.

Establish policies and procedures for customer due diligence that vary based on risk.

D.

Are prohibited from offering numbered accounts to customers, even if procedures are established to gather and maintain due diligence information.

E.

Establish policies and procedures that encourage processing transactions while due diligence information is being established and verified.

Full Access
Question # 80

Benefits of using artificial intelligence (AI) in conjunction with or in place of traditional rules-based transaction monitoring include that AI can: (Select Two.)

A.

Increase the number of false positive alerts

B.

Create unbiased scenarios during the machine training phase

C.

Identify changes in customer behavior to more accurately assess risk

D.

Generate customer risk scores to predict potential financial crime activity

Full Access
Question # 81

Open-source intelligence (OSINT) is the practice of gathering, analyzing, and disseminating information from publicly available sources to address specific intelligence requirements.

What is considered the most effective method for ensuring the reliability of open-source information?

A.

Excluding information obtained from the dark web

B.

Only relying on information from international news agencies

C.

Cross-checking with multiple sources

D.

Ignoring social media sources

Full Access
Question # 82

Business entities established in offshore financial centers (OFCs) pose unique risks for money laundering because they often:

A.

have informal business arrangements between persons or entities.

B.

are located in geographies that are not accountable to US laws.

C.

include trusts, investment funds, and insurance companies.

D.

have limited organizational disclosure and recordkeeping requirements for establishing these business entities.

Full Access
Question # 83

What is the first step that an investigator should take when beginning a financial investigation into a potential suspicious activity?

A.

Determining whether the potential suspicious activity is consistent with the customer's transactional behavior, nature of business, and occupation

B.

Contacting the country's financial intelligence unit's (FIU's) officers to seek advice on whether the potential suspicious activity is indeed a suspicious activity

C.

Gathering and assessing internal sources of information, including information obtained from the customer, transactions, and value and volume

D.

Identifying and reviewing external information, including online presence, customer-related entities, and relevant media

Full Access
Question # 84

Which principle about safeguarding privacy and data should an auditor adhere to when performing an AML investigation?

A.

AML and Data Protection Privacy laws should not be mutually exclusive.

B.

During evidence gathering, privacy laws are less important than local AML laws.

C.

Terrorist financing is more relevant in the context of data protection and supersedes laws.

D.

Countries should clarify where AML and Data Protection Privacy laws are not balanced.

Full Access
Question # 85

Correspondent banking is considered a higher-risk banking sector because correspondent banking transactions:

A.

Are made primarily to and from high-risk jurisdictions

B.

Can be made anonymously and without beneficial ownership information

C.

Typically include less information than domestic payments

D.

Are made cross-border and on behalf of third parties

Full Access
Question # 86

An AML compliance officer receives an independent audit report with a number of findings.

An appropriate response to the report would include:

A.

Drafting detailed action plans for the audit team to execute to close the findings

B.

Reperforming the testing for the controls mentioned in the findings to confirm the results of the audit

C.

Defining remedial actions based on the findings' root cause analysis

D.

Assigning responsibility for reviewing the action plan to the board of directors

Full Access
Question # 87

Which payment type presents the highest financial crime risk?

A.

A check returning a mortgage overpayment made in error

B.

A payment made to a mixer platform

C.

A regular standing order to a high-interest savings account

D.

A bill payment made to a friend after splitting a dinner bill

Full Access
Question # 88

A bank has joined a public-private partnership (PPP) to work with law enforcement and regulators on combating financial crime. However, the bank's data protection officer is concerned about sharing sensitive customer data, and the compliance officer is worried about potential delays in receiving useful information from the government.

Which of the following best describes a benefit of PPPs in fighting financial crime?

A.

PPPs improve financial crime detection and prevention by sharing intelligence between banks and law enforcement.

B.

PPPs help banks reduce compliance costs by automating information sharing.

C.

PPPs allow banks to manage their own suspicious activity report (SAR) filing process without the need to involve the Financial Intelligence Unit (FIU).

D.

PPPs maximize the efficiency of the bank's compliance program by providing real-time intelligence from law enforcement.

Full Access
Question # 89

Which activities are part of adverse media screening for negative news and reputational risks? (Select Three.)

A.

Analyzing customer sentiment through feedback and surveys

B.

Identifying individuals or entities linked to criminal activities or sanctions

C.

Periodically monitoring regulatory updates and enforcement actions for associated entities

D.

Scanning publicly available news articles and regulatory alerts

E.

Monitoring changes in credit scores of individuals or entities

Full Access
Question # 90

Which criminal activities could possibly serve as a predicate offense to financial crimes or money laundering activity? (Select Three.)

A.

Assault

B.

Arson

C.

Bribery or corruption

D.

Fraud

E.

Organized crime or racketeering

Full Access
Question # 91

Which non-governmental bodies typically issue information and guidance related to AML/CFT issues? (Choose two.)

A.

Wolfsberg Group

B.

Transparency International

C.

Financial Action Task Force (FATF)

D.

Tax Justice Network

Full Access
Question # 92

Assessing the money laundering risk related to a product within the financial sector includes assessing the: (Select Two.)

A.

governance arrangements

B.

complexity of the products

C.

results of the last audit

D.

financial status of the business

Full Access
Question # 93

Which of the following are common indicators of possible money laundering within the securities industry? (Choose two.)

A.

Using brokerage accounts like deposit accounts

B.

Receiving securities into an existing brokerage account following the death of a spouse

C.

Allowing fixed income securities to mature

D.

Engaging in transactions involving nominees or third parties

Full Access
Question # 94

A compliance officer at a financial institution has completed an investigation into a high-risk customer's activities and determined that there are strong indications of money laundering. The compliance officer has documented their findings and is ready to recommend offboarding the customer. However, the relationship manager responsible for the customer is resistant to the idea, citing the customer’s significant revenue contribution to the institution.

What should the compliance officer do next to ensure the appropriate escalation and decision-making process is followed?

A.

Escalate the matter to the institution's high-risk client committee, presenting the investigation findings and recommending offboarding while also acknowledging the relationship manager's concerns

B.

Proceed with offboarding the customer unilaterally based on their investigation findings and anti-money laundering (AML) concerns

C.

Attempt to persuade the relationship manager to agree with the offboarding recommendation by highlighting the potential reputational and regulatory risks associated with maintaining the relationship

D.

Delay the offboarding decision and continue monitoring the customer's activities, waiting for further evidence to solidify the case for termination

Full Access
Question # 95

Which of the following is a benefit of public-private partnerships (PPP)?

A.

Sourcing of key resources

B.

Rapid exchange of information on risks and high-risk activities or persons

C.

Ensuring understanding of politically exposed persons (PEPs)

D.

Obtaining salaries in the financial industry

Full Access
Question # 96

A compliance officer is completing a case and has determined that the events do not merit filing a suspicious activity report (SAR).

Which of the following should be included in the case notes to justify not filing a SAR? (Choose two.)

A.

Who made the decision not to file the SAR

B.

Why the officer deemed that the case did not merit filing a SAR

C.

How much money was involved in the case

D.

How the money flowed through the institution

E.

When the unusual activity occurred

Full Access
Question # 97

The primary objectives of the United Nations in developing sanctions regimes include: (Select Three.)

A.

to force developing nations to adopt liberal or substantive democracies.

B.

to support governments and regimes in the peaceful resolution of conflict.

C.

to punish governments for having weak financial crime controls.

D.

to deter non-democratic and non-constitutional changes within countries.

E.

to support the protection of human rights.

Full Access
Question # 98

Which of the following is a common strategy employed by non-governmental organizations (NGOs) to combat money laundering?

A.

Helping Financial Intelligence Units (FIUs) to analyze the suspicious activity reports (SARs)

B.

Directly prosecuting money launderers in court

C.

Providing financial assistance to governments to strengthen their anti-money laundering efforts

D.

Raising awareness about the issue of money laundering and its consequences

Full Access
Question # 99

A risk-based approach (RBA) means that countries, competent authorities, and financial institutions:

A.

Are exempt from mitigating AML/CFT risks assessed as low

B.

Are expected to reduce all residual risks to low

C.

Are expected to identify, assess, and understand the AML/CFT risks to which they are exposed

D.

Will allocate compliance resources to non-compliance-related tasks

Full Access
Question # 100

An AML compliance officer is drafting plans to address deficiencies identified in an independent audit.

Which approach is the best option?

A.

Only commit to action plans that require no new investment to maximize shareholder value

B.

Draft action plans in consultation with the jurisdiction's FIU to remain aligned with other similar companies

C.

Only commit to action plans that can be implemented and closed within the three-month management reporting cycle

D.

Draft action plans to address the root cause of the deficiencies, regardless of how long they will take to fully implement

Full Access
Question # 101

A bank is preparing for a regulatory exam after a previous regulatory exam identified weaknesses in the bank's AML program. Since the last exam, the bank has improved the written AML program, hired an experienced AML compliance officer, and has taken actions to demonstrate a strong culture of compliance. The bank is now focused on getting through their transaction monitoring case backlog and completing enhancements to its sanctions screening program.

Which of the following are correct? (Select Two.)

A.

The bank is likely to face secondary sanctions from global financial institutions despite addressing many of the previous concerns.

B.

The bank may face civil or criminal penalties if it is unable to demonstrate sustained improvement in addressing the previous concerns.

C.

The bank may face the risk of regulatory orders to remediate its AML program despite addressing many of the previous concerns.

D.

The bank is protected from reputational risk arising from any regulatory action because regulatory orders must remain confidential.

E.

The regulatory agency may require the bank's board of directors to publicly share the actions taken to address the previous concerns in order to limit its reputational risk.

Full Access
Question # 102

Which step should financial institutions take when complying with sanctions requirements?

A.

Change the risk profile to "high-risk" if an existing customer becomes a sanctioned entity and continue monitoring further transactions.

B.

Adopt automatic screening systems to detect designated persons and entities.

C.

Conduct enhanced due diligence for prohibited entities on the sanctions list.

D.

Freeze the funds or assets of designated persons and entities once this decision is approved by the board.

Full Access
Question # 103

A large international financial institution (FI) operates in both the United States and the European Union. A cross-border transaction involving a high-net-worth client with dual U.S. and French citizenship raises concerns due to a third-party intermediary in a high-risk jurisdiction.

Given that the transaction falls under the U.S. Bank Secrecy Act (BSA) and OFAC requirements, as well as the EU’s 6th Anti-Money Laundering Directive (6AMLD) and European Banking Authority (EBA) regulations, what is the best approach for the compliance team to ensure compliance?

A.

Follow EU regulations only, as the beneficiary is based in France

B.

Implement a dual-compliance approach satisfying both U.S. and EU AFC regulations

C.

Defer to the most stringent regulatory regime to streamline compliance

D.

Follow U.S. regulations only, as the transaction originates in the United States

Full Access
Question # 104

Fuzzy logic or fuzzy matching in the context of name screening is a method that:

A.

Uses machine learning to predict names based on historical data

B.

Matches names on screening lists to names with similar spellings, patterns, or sounds

C.

Matches names with the same length and characters

D.

Relies exclusively on exact string matches

Full Access
Question # 105

Which of the below would be relevant money laundering red flags for life insurance companies? (Select Two.)

A.

Paying premium several years in advance and terminating early for a refund

B.

Natural persons having more than one insurance policy

C.

High-premium life insurances that provide high payouts

D.

Regularly switching policies and accepting penalties

E.

Beneficiary payouts to elderly people

Full Access
Question # 106

Financial crime risk related to the use of "hawalas" can stem from: (Select Two.)

A.

difficulty in tracking the originator, recipient, and source of transactions.

B.

remote verification of identity by third-party program managers.

C.

heavy usage by senior political figures.

D.

informal networks used for cross-border transactions outside of the formal banking system.

E.

heightened risks of returned transactions.

Full Access
Question # 107

The Office of Foreign Assets Control (OFAC) is responsible for:

A.

Ensuring an effective export control and treaty compliance system

B.

Administering and enforcing economic and trade sanctions

C.

Designating jurisdictions as primary money laundering concerns

D.

Managing trade agreements between the US and foreign countries

Full Access
Question # 108

Which practices should financial institutions (FIs) adopt for the process of terminating customer relationships? (Choose three.)

A.

Utilizing a flexible communication style that adapts to different customer situations during the termination process

B.

Implementing a standardized procedure for customer termination that includes risk assessments and necessary documentation

C.

Performing a final review of a customer's transaction history and records to address any unresolved issues prior to termination

D.

Keeping records of the termination process, including the justification for the decision and any correspondence with the customer

E.

Notifying the customer of the termination decision only after completing the termination process to prevent possible disputes

Full Access
Question # 109

The supply of goods and services can be vulnerable to corruption within a company, particularly the solicitation and receipt of bribes and kickbacks, because: (Choose two.)

A.

certain contractors may receive preferential treatment, allowing them opportunities to inflate margins during the tender process

B.

unsuccessful bidders are informed of decisions and provided detailed justifications for awarding the contracts

C.

procurement and contracting processes involve the management of the tender process, which may lack sufficient oversight

D.

bids are solicited and disseminated to a wide audience through advertising and other channels.

Full Access
Question # 110

Which regulatory bodies cooperate when dealing with cross-border suspicious or unusual financial activity investigations?

A.

European Commissions

B.

Financial Action Task Forces

C.

Wolfsberg Groups

D.

Financial Intelligence Units

Full Access
Question # 111

Which scenario best justifies why a customer's account might be closed by a financial institution?

A.

The customer is the object of a civil subpoena.

B.

The customer uses a shipping company dealing with specially designated nationals.

C.

The account shows periodic fixed amount remittances for tuition fees.

D.

The account has transactions that triggered multiple suspicious activity reports.

Full Access
Question # 112

News published in Country A reports that a politically exposed person (PEP) had received a bribe from a transnational company headquartered in a developing country of approximately USS1.5 million deposited into on account at a financial institution (Fl> located in Country B Both countries are members of the Egmont Group The account where the money was deposited belongs to the PEP's immediate family member. To corroborate the facts, the PIU of Country A sent a formal request via secure communication channels for further information from its counterpart FIU in Country B.

According to Egmont principles, the FIU of Country B can:

A.

provide the information available to them because the exchange is between two FlUs that are members of the Egmont Group, and the formal request was made using secure communication channels.

B.

provide the requested information only if a memorandum of understanding (MoU) is signed between Country A and Country

C.

direct the FIU of Country A to the Fl where the account was opened for further information.

D.

deny the request if the FIU of Country B has not received a suspicious activity report (SAR) from the Fl where the account was opened.

Full Access
Question # 113

What are the primary advantages of using open-source tools in financial crime investigations? (Choose two.)

A.

Partial automation of data collection and analysis

B.

Cost-effective access to a wide range of data

C.

Real-time monitoring of selected transactions and data sources

D.

Ability to conduct investigations with minimal human oversight

E.

Enhanced ability to identity connections across various data sets

Full Access
Question # 114

A global financial institution is conducting a comprehensive review of its due diligence processes to strengthen its defenses against financial crime. Recent incidents have highlighted vulnerabilities related to employee misconduct, including unauthorized transactions and sharing of sensitive customer information. Additionally, the FI has faced issues with third-party vendors who failed to meet compliance standards, leading to increased regulatory scrutiny.

Which of the following measures would be most effective in addressing the bank's due diligence needs for employees, vendors, and third parties to mitigate insider threats and ensure compliance with AML regulations?

A.

Relying on self-reported compliance certifications from vendors and employees to confirm adherence to AML standards on a periodic basis

B.

Establishing a surveillance program for employees, vendors, and third parties, including periodic risk assessments, access controls, and regular reviews of their compliance with AML policies

C.

Implementing background checks for employees and vendors prior to onboarding or the start of engagement to identify any red flags

D.

Limiting the number of vendors and third parties in high-risk jurisdictions in order to reduce exposure to compliance risks

Full Access
Question # 115

When applying new technologies to AML, application programming interfaces (APIs) allow for:

A.

Digital identification on mobile devices

B.

Different applications to connect and communicate

C.

Authentication via artificial intelligence (AI) and biometrics

D.

Quick CDD and client traits analysis during onboarding

Full Access
Question # 116

Which of the following is a benefit of an institution implementing machine learning to identify suspicious transactions?

A.

Adaptable to new AFC typologies through continuous model training

B.

Completely unbiased and without error through continuous model training

C.

More consistent and reliable detection outcomes

D.

Transparent and easy to explain algorithms for regulator and compliance purposes

Full Access
Question # 117

It is important to validate the “conceptual soundness” of an AML model in order to:

A.

Verify alignment with regulatory guidance and industry best practices

B.

Assess whether the model’s methodology and assumptions are logical and appropriate for detecting money laundering

C.

Validate the statistical significance of the model’s predictive capabilities

D.

Demonstrate compatibility with current technological infrastructure

Full Access
Question # 118

Which types of external data sources are expected to be used for screening customers as part of customer due diligence (CDD)? (Select Three.)

A.

Customer feedback and online review platforms

B.

Social media profiles to assess lifestyle and spending habits

C.

Sanctions lists, including those issued by the Office of Foreign Assets Control (OFAC)

D.

Registers of stolen or forged documents (where available)

E.

Beneficial ownership registers and adverse media sources

Full Access