A politically exposed person (PEP) opens a crypto account. What is the required action?
To identify and assess the money laundering risks emerging from virtual assets, countries should ensure that virtual asset service providers are: (Select Two.)
In the context of forensic cryptocurrency investigations, which statement best describes how attribution data are collected?
What is the most pertinent item for a cryptoasset money services business to include in a suspicious activity report?
Which is the first action a virtual asset service provider (VASP) should take when it finds out that its customers are engaging in virtual asset (VA) transfers related to unhosted wallets and peer-to-peer (P2P) transactions?
Which key type of information allows financial intelligence units to combat the risk of anonymity in virtual currencies?
A client at a virtual asset service provider (VASP) opened a wallet four weeks earlier with 201,000 USD. The client received a Bitcoin transfer for a total of 565,400 USD. Which is the strongest indication of an illicit source of funds for the client?
Which privacy-enhancing feature hides both the sender and receiver in a transaction?
A suspicious activity report was filed in the EU for a local company account that held funds generated by the sale of product coupons. A review of the account highlighted a login from an unconnected IP address. Despite repeated requests, the customer failed to provide information on the origins of the funds. Which is the main red flag here?
A virtual asset service provider (VASP) is using public information on the blockchain to trace a wallet address. Which additional step is necessary to identify the owner or controller of that address?
The lightning network is apayment protocol built on top of the Bitcoin blockchainthat:
A customer sends funds to multiple newly created wallets before cashing out via an exchange. This is an example of:
Which activity is most commonly associated with mixing and tumbling as a method of laundering cryptoassets?
How does law enforcement use Suspicious Activity Reports (SARs)? (Select Two.)
Which advantage ofthe proofof work consensus algorithm is widely applicable in many cryptocurrencies and other blockchainsystems?
What is the correct risk assessment equation used in AML/CFT compliance frameworks, including for cryptoasset risk evaluations?
Under FATF guidelines, VASPs must file a Suspicious Transaction Report (STR) when:
Which is the most important consideration when assessing compromise risks when creating a decentralized finance protocol or smart contract?
When enhances international cooperation with regard to law enforcement investigations of virtual asset (VA) crimes?
According to the Financial Crimes Enforcement Network's Guidance 2019-G0001 pertaining to convertible virtual currencies, a money transmitter includes companies that:
Which business category below is considered to present the highest risk of money laundering?