Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ACAMS > AML Certifications > CCAS

CCAS Certified Cryptoasset Anti-Financial Crime Specialist Examination Question and Answers

Question # 4

A politically exposed person (PEP) opens a crypto account. What is the required action?

A.

Treat as standard customer.

B.

Apply EDD and senior management approval.

C.

Decline onboarding.

D.

Request a travel rule exemption.

Full Access
Question # 5

Misconfigured smart contracts can allow which type of scam to occur?

A.

Phishing

B.

SIM

C.

Rug pull

D.

Ransomware

Full Access
Question # 6

To identify and assess the money laundering risks emerging from virtual assets, countries should ensure that virtual asset service providers are: (Select Two.)

A.

Connected with a regulated financial institution.

B.

Subjected to AML regulations

C.

Maintaining effective monitoring systems.

D.

Located in a jurisdiction with increased regulatory expectations

E.

Evaluated for beneficial ownership of virtual asset clients

Full Access
Question # 7

In the context of forensic cryptocurrency investigations, which statement best describes how attribution data are collected?

A.

Taken from business-maintained records.

B.

Derived from public and non-public sources.

C.

Gathered from a publicly available blockchain.

D.

Obtained automatically from the darknet.

Full Access
Question # 8

What is the most pertinent item for a cryptoasset money services business to include in a suspicious activity report?

A.

All types of cryptocurrencies purchased by the subject, including aggregate total of each and fiat currency equivalent

B.

The names of every owner of the destination wallet address(es) to which the subject sent transactions during the review period

C.

The aggregate total amount of fiat currency used by the subject to purchase cryptocurrency

D.

The subject's account onboarding information not otherwise included in the counter-party information section

Full Access
Question # 9

Which is the first action a virtual asset service provider (VASP) should take when it finds out that its customers are engaging in virtual asset (VA) transfers related to unhosted wallets and peer-to-peer (P2P) transactions?

A.

Allow VA transfers related P2P or unhosted wallets below 1,000 USD or the equivalent amount in local currency, or per defined thresholds in local regulations.

B.

Freeze accounts with records of transactions related to P2P transactions or unhosted wallets.

C.

Collect and assess the data on transactions related to P2P or unhosted wallets to determine if it is within its risk appetite.

D.

Enhance existing risk-based control framework to account for specific risks posed by transactions related to P2P or unhosted wallets.

Full Access
Question # 10

In sanctions screening, a “fuzzy match” occurs when:

A.

There is no match found.

B.

A partial or near match to a sanctions list entry occurs.

C.

Only wallet addresses match exactly.

D.

The customer is in a low-risk jurisdiction.

Full Access
Question # 11

Which key type of information allows financial intelligence units to combat the risk of anonymity in virtual currencies?

A.

The data referring to the timing of the transaction

B.

The data reconciling the transaction and the identity of the receiver

C.

The data connecting the transaction information to the virtual address

D.

The data associating the virtual address to the identity of the owner

Full Access
Question # 12

Which is a core component of customer due diligence (CDD)?

A.

Transaction batching

B.

Identity verification

C.

Token staking

D.

Node validation

Full Access
Question # 13

A client at a virtual asset service provider (VASP) opened a wallet four weeks earlier with 201,000 USD. The client received a Bitcoin transfer for a total of 565,400 USD. Which is the strongest indication of an illicit source of funds for the client?

A.

Two days after opening the wallet, the client transfers 199,000 USD to a third party.

B.

The client declared a total wealth of 600,000 USD at account opening.

C.

It was not possible to trace the client's IP address.

D.

Incoming funds moved through five intermediary wallets before being transferred from a foreign VASP.

Full Access
Question # 14

Which privacy-enhancing feature hides both the sender and receiver in a transaction?

A.

Ring signatures

B.

Multi-sig

C.

Proof-of-Authority

D.

Token swap

Full Access
Question # 15

A suspicious activity report was filed in the EU for a local company account that held funds generated by the sale of product coupons. A review of the account highlighted a login from an unconnected IP address. Despite repeated requests, the customer failed to provide information on the origins of the funds. Which is the main red flag here?

A.

Virtual asset service providers outside of the EU are being relied upon.

B.

Funds are generated by the sale of coupons which are connected to a physical product.

C.

There is a failure to cooperate with the source of funds requests.

D.

An IP address is being used that is not previously connected to that customer.

Full Access
Question # 16

A virtual asset service provider (VASP) is using public information on the blockchain to trace a wallet address. Which additional step is necessary to identify the owner or controller of that address?

A.

Review the wallet address information periodically.

B.

Acquire information to connect the wallet address to a natural person.

C.

Screen the wallet address for any historical transaction activity.

D.

Obtain further information connecting wallet address to virtual asset transactions.

Full Access
Question # 17

The lightning network is apayment protocol built on top of the Bitcoin blockchainthat:

A.

allows usersto send large payments to decentralised exchanges

B.

allows the bridging of assets from one blockchain to another.

C.

allows users to take advantage of no transaction fees.

D.

allows users to conduct transactions off-chain

Full Access
Question # 18

A customer sends funds to multiple newly created wallets before cashing out via an exchange. This is an example of:

A.

Structuring

B.

Chain hopping

C.

Layering

D.

Dusting

Full Access
Question # 19

Which activity is most commonly associated with mixing and tumbling as a method of laundering cryptoassets?

A.

Presence of unknown or disguised source of funds

B.

Rapid purchase and sale of different cryptocurrencies

C.

Use of IP address concealing software

D.

Frequent transactions to high-risk jurisdictions via different virtual asset service providers

Full Access
Question # 20

How does law enforcement use Suspicious Activity Reports (SARs)? (Select Two.)

A.

To identify regulatory failings

B.

To produce evidence of money laundering that can be used in court

C.

To develop intelligence on new targets

D.

To confirm or develop information on existing targets

Full Access
Question # 21

Which advantage ofthe proofof work consensus algorithm is widely applicable in many cryptocurrencies and other blockchainsystems?

A.

Dependency on electricity

B.

Centralization of the consensus mechanism

C.

Verification of transactions by solving complex mathematical puzzles

D.

Security of small networks

Full Access
Question # 22

Under the risk-based approach, firms must:

A.

Apply the same level of due diligence to all customers

B.

Adjust controls based on customer and transaction risk level

C.

Avoid onboarding high-risk customers

D.

Only monitor transactions over USD 10,000

Full Access
Question # 23

Which is a type of restricted blockchain?

A.

Hybrid

B.

Public

C.

Private

D.

Consortium

Full Access
Question # 24

What is the correct risk assessment equation used in AML/CFT compliance frameworks, including for cryptoasset risk evaluations?

A.

Inherent Risk – Control Effectiveness = Residual Risk

B.

Inherent Risk – Residual Risk = Control Effectiveness

C.

Residual Risk + Control Effectiveness = Inherent Risk

D.

Inherent Risk + Control Effectiveness = Residual Risk

Full Access
Question # 25

Under FATF guidelines, VASPs must file a Suspicious Transaction Report (STR) when:

A.

Any transaction is over $1,000

B.

They suspect funds are linked to criminal activity, regardless of amount

C.

A politically exposed person makes a deposit

D.

The transaction involves an unhosted wallet

Full Access
Question # 26

In cryptoasset AML programs, “ongoing monitoring” means:

A.

Checking customer activity only when onboarding

B.

Continuous review of transactions to detect anomalies

C.

Only screening customers for sanctions once

D.

Freezing all suspicious accounts

Full Access
Question # 27

Which is the most important consideration when assessing compromise risks when creating a decentralized finance protocol or smart contract?

A.

Security token standard

B.

Dual authentication protocols

C.

Government regulation

D.

Code uniqueness

Full Access
Question # 28

When enhances international cooperation with regard to law enforcement investigations of virtual asset (VA) crimes?

A.

Join Financial Action Task Force to access the network of jurisdictions

B.

Establish a new Independent state agency for VAs.

C.

Develop smart contracts for information sharing.

D.

Designate a financial Intelligence unit

Full Access
Question # 29

According to the Financial Crimes Enforcement Network's Guidance 2019-G0001 pertaining to convertible virtual currencies, a money transmitter includes companies that:

A.

Exchange digital tokens.

B.

Provide the delivery, communication, or network access services to only support money transmission services.

C.

Operate a clearance and settlement system or otherwise act as intermediaries solely between Bank Secrecy Act-regulated institutions.

D.

Act as payment processors to facilitate the purchase of, or payment of a bill for, a good or service through a clearance and settlement system.

Full Access
Question # 30

Which business category below is considered to present the highest risk of money laundering?

A.

Registered hedge fund

B.

Pharmaceutical company

C.

Law firm

D.

Art dealer

Full Access