An institution is looking to alter an existing threshold-based monitoring scenario because it is generating too many alerts that do not yield suspicious activity reports.
Documentation submitted to the relevant committee for supporting this proposal should include details on: (Choose three.)
Which statements regarding using network analysis tools to determine links to criminality are true? (Choose three.)
According to guidelines issued by Basel Committee on Banking Supervision relating to corporate governance principles for banks, what is the role of the board of directors in addressing an institution's AML oversight and governance?
Which of the following processes or tools contribute to AML compliance despite being seemingly unrelated? (Choose two.)
Financial crime risk related to the use of "hawalas" can stem from: (Select Two.)
According to the Egmont Group, which benefits do public-private partnerships (PPPs) provide to Financial Intelligence Units (FIUs)? (Select Three.)
A bank has joined a public-private partnership (PPP) to work with law enforcement and regulators on combating financial crime. However, the bank's data protection officer is concerned about sharing sensitive customer data, and the compliance officer is worried about potential delays in receiving useful information from the government.
Which of the following best describes a benefit of PPPs in fighting financial crime?
Which of the following conditions contribute to a politically exposed person (PEP) posing greater risk than a typical high-risk bank customer? (Select Two.)
It Is important for financial institutions (FIs) to be aware of anti-financial crime (AFC) and sanctions regulatory regimes in other jurisdictions in order to.
Which techniques are most commonly used in a rules-based approach to transaction monitoring for detecting suspicious activities? (Choose two.)
Interactions between the compliance department and other functions or departments within an organization contribute to making the anti-financial crime (AFC) compliance program more robust by addressing specific risk areas.
Which departments play a crucial role in enhancing the AFC compliance program of an organization? (Select Two.)
Which of the following serves as an example of a successful public-private partnership (PPP)?
Non-compliance with relevant anti-money laundering laws and regulations can result in: (Select Two.)
A bank is preparing for a regulatory exam after a previous regulatory exam identified weaknesses in the bank's AML program. Since the last exam, the bank has improved the written AML program, hired an experienced AML compliance officer, and has taken actions to demonstrate a strong culture of compliance. The bank is now focused on getting through their transaction monitoring case backlog and completing enhancements to its sanctions screening program.
Which of the following are correct? (Select Two.)
Which of the following is an important factor to consider when setting up an anti-financial crimes (AFC) compliance program governance structure?
What are the primary sources of reference besides AML laws and regulations when developing and maintaining the AML policies, standards, and procedures of a bank? (Choose three.)
According to PinCEN. when a financial institution (PI) identities a suspicious activity that necessitates suspicious activity report (SAR) filing, the SAR supporting documentation should (Select Two.)
Public-private partnerships (PPPs) that involve the sharing of information between law enforcement authorities, Financial Intelligence Units (FIUs), and the private sector are established to: (Select Two.)
Which risk factors are associated with acquiring and servicing the banking activities of customers considered higher risk for financial crime activities? (Select Three.)
A wealthy individual is using a complex corporate structure to facilitate illegal logging and then illegal mining of the resulting resources from that land.
Which category of predicate crime is taking place?
Which of the following are benefits of the latest KYC solutions, including but not limited to digital onboarding, eKYC, digital identity, facial recognition, liveness checks, biometrics, and geolocation? (Choose three.)
Cryptocurrency-related technologies that can be exploited by money launderers include: (Select Two.)
Upon learning of a potential weakness through an organization's enterprise-wide sanctions risk assessment relating to a low number of sanctions screening alerts generated compared to the business size and operations identified, which action would best ensure the risk area is properly managed and remediated to the best possible extent?
A legal instrument executed between two nations that governs cross-border information sharing is known as a:
Red flags for potential money laundering in real estate include completing luxury real estate purchases. (Select Two.)
A global financial institution is conducting a comprehensive review of its due diligence processes to strengthen its defenses against financial crime. Recent incidents have highlighted vulnerabilities related to employee misconduct, including unauthorized transactions and sharing of sensitive customer information. Additionally, the FI has faced issues with third-party vendors who failed to meet compliance standards, leading to increased regulatory scrutiny.
Which of the following measures would be most effective in addressing the bank's due diligence needs for employees, vendors, and third parties to mitigate insider threats and ensure compliance with AML regulations?
A compliance officer is reviewing an institutional banking prospect proposal for a new foreign entity that is a multinational business but headquartered in a country where most businesses are state-owned.
Which risks should be prioritized in the review? (Choose two.)
Which of the following best describes the degree of cooperation between regulatory authorities, law enforcement agencies, and Financial Intelligence Units (FIUs) during money laundering investigations, including cross-border cases?
A client advisor at a bank contacts a member of the compliance team for guidance on how to proceed with a client who wants to transfer US$250,000 from the sale of cryptoassets into their savings account at the bank.
What guidance should the compliance team provide?
Which of the following best describes the use of fuzzy logic in customer screening systems?
Which of the following are potential financial crime-related red flags when obtaining client data? (Choose three.)
It is essential to identify any "family members" or "close associates" of politically exposed persons (PEPs) as part of the KYC/CDD process because they could be:
While gaming platforms are typically used for recreational purposes, they can potentially be used for terrorist financing through games in which players can:
Which of the following programs would most likely be considered part of an effective supervision regime for a regulator?
In order to prevent financial crime risk, the implemented policies, controls, and procedures must:
A large international bank's chief compliance officer (CCO) is exploring ways to enhance the bank's ability to identify suspicious activities by using intelligence data more effectively. One potential solution is to engage in public-private partnerships (PPPs) to leverage shared intelligence and enhance collaboration with government agencies.
The bank considers joining a PPP initiative with the local Financial Intelligence Unit (FIU) and other financial institutions to improve its access to relevant data and intelligence. The CCO understands that while PPPs can provide significant benefits, such as improved risk detection and enhanced information sharing, there are also potential limitations, including data privacy concerns and differing priorities between public and private sector partners.
Which approach would best maximize the benefits of PPPs for the bank while mitigating the limitations associated with data sharing and intelligence?
Which customer actions are red flags for virtual currency peer-to-peer transactions? (Choose two.)
Which regulation permits financial institutions, upon providing notice to the US Department of the Treasury, to share information with one another in order to identify and report activities that may involve money laundering or terrorist activity to the federal government?
The financial industry relies heavily on rules-based approaches to transaction monitoring to detect suspicious activities.
Scenario-based systems use technology and algorithms to identify: (Choose three.)
The United Nations Security Council (UNSC) is empowered to impose sanctions regimes against countries and terrorist organizations.
Which statements are true regarding sanctions imposed by the UNSC? (Select Two.)
In a large US bank, an individual leads a team in charge of overseeing the governance and effectiveness of the bank's transaction monitoring approach.
Which strategies should the team implement? (Select Two.)
Assessing the money laundering risk related to a product within the financial sector includes assessing the: (Select Two.)
To provide aid in investigating a cross-border money laundering case, a Financial Intelligence Unit (PIU) that is a member of the Egmont Group can:
During a routine periodic KYC refresh of a policyholder and client of an insurance company, updated business registry documentation has highlighted that the policyholder's business has changed addresses five times during the last year and that the ultimate beneficial owner (UBO) changed two weeks ago.
What actions should be taken immediately?
Which of the following scenarios describe common risk indicators of money laundering faced by operators of legitimate money services businesses (MSBs)? (Select Three.)
Which ancillary departments or operational areas can play an essential role in supporting a larger organization's Anti-Money Laundering and Economic Sanctions compliance program? (Choose three.)
Arecruitment manager in the human resources departmentof a bank hasshortlisted a candidate for the position of relationship manager in its private banking division.
Thebank’s compliance policyrequiresproper background checksto protect againstfraud and money laundering risks.
Whichresourceswould bemost usefulfor identifying potential negative information regarding the shortlisted candidate? (Select Three.)
Which of the following is a broader risk specific to casinos and gambling?
Which risks are specifically associated with the misuse of gaming accounts in financial crime? (Choose three.)
Having a risk-based approach is central to a financial institution understanding the money laundering and terrorist financing risk to which they are exposed. The development of a money laundering and terrorist financing risk assessment is a key starting point.
Commonly used risk factors include. (Select Three.)
Which of the following measures can help maintain the independence of BSA/AML compliance staff to ensure effective compliance controls?
An employee at a financial institution (Fl) suspects that one of their co-workers is involved in a financial investment scam syndicate. Which step should be taken next by the employee who has the suspicion?
Which of the following presents the highest money laundering risk from a money services business (MSB)?
A legal instrument which is executed between two nations and governs cross-border information sharing Is known as a.
Which money laundering risks are posed by the misuse of trust and asset management services? (Select Three.)
Which of the following are considered best practices for effective AML/CFT training programs? (Select Three.)
Which of the following best describes one of the principal threats of proliferation financing?
Using artificial intelligence (Al) and machine learning-based techniques tn adverse media screening can: (Choose three.)
In a standard customer due diligence (CDD) process focused on financial inclusion, the Financial Action Task Force (FATF) Recommendations require: (Choose two.)
From an international standards perspective both the EU and Financial Action Task Force (FATF) consider data sharing a crucial component of effective anti-money laundenng measures because data sharing:
Which o! the following are considered best practices regarding senior management involvement in a financial crime compliance program? (Select Two.)
A multinational corporation is considering expanding into a new market with a history of political instability and corruption.
Which strategy would be most effective in mitigating reputational risk from a financial crime perspective associated with such an expansion?