Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

CAMS Certified Anti-Money Laundering Specialist (CAMS7 the 7th edition) Questions and Answers

Questions 4

An employee at a financial institution (Fl) suspects that one of their co-workers is involved in a financial investment scam syndicate. Which step should be taken next by the employee who has the suspicion?

Options:

A.

Question their co-worker to determine If their suspicions are correct before reporting to the Fl's Human Resources department

B.

Use the Fl's whistle blowing channel to report the suspected employee

C.

Warn colleagues and customers of the F1 that the employee's suspicious financial investment proposals could be a scam

D.

Conduct an open-source intelligence investigation using artificial intelligence tools to gain more information on the activities of the suspected employee

E.

Report the suspected employee to the line manager of the F1 to take the required action

Buy Now
Questions 5

Which risk factors are associated with acquiring and servicing the banking activities of customers considered higher risk for financial crime activities? (Select Three.)

Options:

A.

Reputational risk

B.

Operational risk

C.

Sanctions risk

D.

Compliance risk

E.

Lending risk

Buy Now
Questions 6

A legal instrument executed between two nations that governs cross-border information sharing is known as a:

Options:

A.

Memorandum of Agreement.

B.

Declaration of Understanding.

C.

Memorandum of Understanding.

D.

Mutual Legal Assistance Treaty.

E.

Request for Urgent Information.

Buy Now
Questions 7

Which of the following ate efficient approaches lo performing horizon scanning? (Select Two.)

Options:

A.

Subscribing lo a regulators' newsletter

B.

Using a specific provider for regulatory horizon scanning

C.

Regularly contacting the regulator to inquire about updates and future developments

D.

Relying on information and insights from peers and working groups

Buy Now
Questions 8

The United Nations Security Council (UNSC) is empowered to impose sanctions regimes against countries and terrorist organizations.

Which statements are true regarding sanctions imposed by the UNSC? (Select Two.)

Options:

A.

Attempts to circumvent or evade sanctions imposed by the UNSC can constitute a criminal offense if designated under local laws and regulations

B.

The UN can impose arms embargoes but cannot prohibit direct or indirect exports of other goods to specific countries

C.

Member countries of the United Nations are expected to implement and enforce sanctions imposed by the UNSC

D.

Direct breaches of sanctions imposed by the UNSC constitute a criminal offense in all member countries

Buy Now
Questions 9

In which of the following cases can a financial institution disclose a suspicious activity report (SAR)?

Options:

A.

A court order requests the bank to disclose the SAR subject to obtaining agreement from the legal team

B.

A customer asks about potential reporting to the local Financial Intelligence Unit (Fill)

C.

An external consultant inquires about the details of the SAR

D.

A third-country police directly inquires about the customer.

Buy Now
Questions 10

Which of the following are common indicators of possible money laundering within the securities industry? (Select Two.)

Options:

A.

Receiving securities into an existing brokerage account following the death of a spouse

B.

Allowing fixed income securities to mature

C.

Using brokerage accounts like deposit accounts

D.

Engaging in transactions involving nominees or third parties

Buy Now
Questions 11

Which benefits are most commonly associated with transitioning from a rules-based approach to artificial intelligence (AI) and machine learning-based tools in transaction monitoring? (Choose three.)

Options:

A.

Reduction in the number of false positives in long term

B.

Complete automation of compliance processes

C.

Elimination of the need for human oversight

D.

Increased flexibility in adapting to changing financial crime risks

E.

Enhanced ability to detect emerging patterns and anomalies

Buy Now
Questions 12

What are the primary sources of reference besides AML laws and regulations when developing and maintaining the AML policies, standards, and procedures of a bank? (Choose three.)

Options:

A.

National Risk Assessment

B.

Regulatory guidance or publications

C.

Government or state-run newspapers

D.

Guidance issued by international bodies

E.

Policies and procedures developed by other banks

Buy Now
Questions 13

A financial crimes risk appetite statement describes:

Options:

A.

how an organization defines Its risk-based approach.

B.

how an organization determines its key risk and performance indicators.

C.

the level and type of risk the organization is willing to take to meet its objectives

D.

the purpose of an organization's financial crimes compliance program.

Buy Now
Questions 14

Which of the following risk factors are considered by many supervisory authorities as representing a higher inherent risk associated with MSBs? (Select Two.)

Options:

A.

The use of new technologies to facilitate the onboarding of customers remotely

B.

The prevalence of international wire transfers

C.

Domestic business with small and medium-sized enterprises

D.

The cash-intensive nature of the services offered

E.

The use of digital channels and traceable payment methods

Buy Now
Questions 15

Which line of defense would be tasked with interpreting new AML regulations and revising training for client-facing relationship managers?

Options:

A.

The first line

B.

The second line

C.

Senior management

D.

The third line

Buy Now
Questions 16

According to the Egmont Group, which benefits do public-private partnerships (PPPs) provide to Financial Intelligence Units (FIUs)? (Select Three.)

Options:

A.

Helping overcome data protection and information sharing limitations

B.

Enhancing the quality of reporting and additional informational input

C.

Helping to alleviate the financial cost burden on law enforcement

D.

Helping to design common approaches and identify desired deliverables

E.

Offering flexibility, agility, and opportunities to adjust to the ML/TF threat environment

Buy Now
Questions 17

Which of the following statements describe the strengths associated with public-private partnerships (PPPs)? (Choose two.)

Options:

A.

Public organizations can belter understand what the private sector experiences and inform policy and the enactment of laws

B.

Data-protection privacy policies provide an opportunity to develop information sharing protocols to prevent unauthorized access to information

C.

Data-protection privacy policies prohibit the evolution of PPPs due to restrictions based on legacy government legislation

D.

Small business owners can choose third-party providers or financial institutions to keep their private data safe which can easily be shared within a PPP

Buy Now
Questions 18

Which characteristic of accountants is most attractive to those looking to launder funds using an accountant or accountancy firm?

Options:

A.

Accountants can prepare ledgers and spreadsheets, draft annual returns and make payments to government offices

B.

Accountants can advise on the structuring of companies as well as ensure compliance with local tax regulations

C.

Accountants are knowledgeable about financial management, including what to record over the course of the accounting year

D.

Accountants are able to create and structure companies, falsify accounts and manipulate financial statements

Buy Now
Questions 19

Which of the following is a key consideration for a global organization when managing AFC and sanctions compliance across multiple jurisdictions?

Options:

A.

Ensuring sanctions compliance by relying solely on international bodies like the UN because there is no requirement to adhere to local laws

B.

Ensuring group policies and procedures prioritize adherence to US regulations because they are the most influential worldwide

C.

Applying global AFC and sanctions policies to ensure consistency without the need to adapt to local regulations

D.

Ensuring group policies cater to compliance with each country's specific AML and sanctions regulations

Buy Now
Questions 20

Which of the following processes or tools contribute to AML compliance despite being seemingly unrelated? (Choose two.)

Options:

A.

Customer loyalty program tracking

B.

Product usage analysis

C.

Customer satisfaction surveys

D.

Customer support ticket tracking

E.

Credit risk assessment

Buy Now
Questions 21

In which of the following situations would it be most crucial for the designated AML compliance officer of a company to perform a complete review of the company's AML program, including identifying the risks and commensurate controls?

Options:

A.

An external audit highlights several deficiencies

B.

The company is merging with or acquiring another entity

C.

Extensive AML legislation is proposed by a legislative body in the company's jurisdiction

D.

A high-profile money laundering case involving another industry is publicized

Buy Now
Questions 22

Options:

A.

Ensuring sanctions compliance by relying solely on international bodies like the UN because there is no requirement to adhere to local laws.

B.

Ensuring group policies and procedures prioritize adherence to US regulations because they are the most influential worldwide.

C.

Applying global AFC and sanctions policies to ensure consistency without the need to adapt to local regulations.

D.

Ensuring group policies cater to compliance with each country's specific AML and sanctions regulations.

Buy Now
Questions 23

When a financial institution (FI) is considering providing traditional banking services to a virtual asset service provider (VASP), consideration should be given to whether the FI: (Select Two.)

Options:

A.

has a general understanding of virtual assets.

B.

consistently reviews transactions between fiat and virtual currencies.

C.

implements enhanced KYC measures.

D.

owns virtual currencies itself.

Buy Now
Questions 24

Which of the following statements best describes the financial crime risk associated with gatekeepers?

Options:

A.

Gatekeepers have specialized knowledge that can be abused to facilitate the movement of illicit funds and conceal the Involvement of their clients in illicit schemes.

B.

Gatekeeper positions ate of a secretive nature, often making it difficult to verify (heir source of wealth.

C.

Gatekeepers have unique relationship structures, making it difficult to determine beneficial ownership

D.

Gatekeepers are entrusted with prominent functions and code of conduct that can assist laundering Illicit funds.

Buy Now
Questions 25

Which of the following are benefits of the latest KYC solutions, including but not limited to digital onboarding, eKYC, digital identity, facial recognition, liveness checks, biometrics, and geolocation? (Choose three.)

Options:

A.

Guaranteeing 100% accuracy in regulatory compliance across all jurisdictions

B.

Improving customer satisfaction by offering personalized recommendations

C.

Reducing identity theft effectively

D.

Providing reliable customer authentication to enhance trust

E.

Decreasing the time required for customer authentication

Buy Now
Questions 26

When a government imposes economic sanctions on a target the purpose is to:

Options:

A.

protect the rights of the citizens of the state target against their own government and improve financial stability in the region.

B.

indicate that the use of military force is likely unless the state or non-state target complies with the government's

C.

interests encourage non-governmental organizations to increase the provision of humanitarian and charitable aid to the target

D.

alter the behavior of the state or non-state target that threatens the interests of that government or violates international norms

Buy Now
Questions 27

The primary objectives of the Financial Action Task Force (FATF) are to: (Choose two.)

Options:

A.

evaluate and monitor compliance with the FATF standards and provide recommendations for improvement.

B.

assist countries in implementing EU, UN, and regional sanctions regimes.

C.

develop and promote international standards to prevent money laundering and terrorist financing.

D.

conduct investigations on countries legislations and laws to prevent them from being used for money laundering and terrorist financing.

E.

ensure that countries follow its laws to maintain financial stability.

Buy Now
Questions 28

A large international bank's chief compliance officer (CCO) is exploring ways to enhance the bank's ability to identify suspicious activities by using intelligence data more effectively. One potential solution is to engage in public-private partnerships (PPPs) to leverage shared intelligence and enhance collaboration with government agencies.

The bank considers joining a PPP initiative with the local Financial Intelligence Unit (FIU) and other financial institutions to improve its access to relevant data and intelligence. The CCO understands that while PPPs can provide significant benefits, such as improved risk detection and enhanced information sharing, there are also potential limitations, including data privacy concerns and differing priorities between public and private sector partners.

Which approach would best maximize the benefits of PPPs for the bank while mitigating the limitations associated with data sharing and intelligence?

Options:

A.

Engage in the PPP without strict data sharing protocols, allowing for open and unrestricted flow of information between the bank, FIUs, and other financial institutions

B.

Rely solely on the intelligence provided by government agencies through the PPP because they have the most comprehensive data on suspicious activities

C.

Establish a clear framework within the PPP that outlines data privacy protections and ensures that information sharing complies with legal and regulatory requirements in all jurisdictions involved

D.

Prioritize the bank’s internal data sources over external intelligence from PPPs, as internal data is easier to control and does not present data privacy challenges

Buy Now
Questions 29

The compliance officer at a casino in Taiwan discovers that the casino received multiple cash deposits from a customer just below the Large-Amount Transaction Report (LTR) limit on consecutive days. The customer used three different betting accounts.

What is the appropriate next step?

Options:

A.

Make a note in the customer's account that the customer's gambling activities are frequently conducted below the reporting limit

B.

Follow internal reporting procedures to escalate the activity as suspicious and report to appropriate authorities

C.

Inform the customer their activity Is suspicious and request an explanation

D.

Contact law enforcement to launch an Investigation into the customer's financial activities

Buy Now
Questions 30

Which services provided by an accounting firm could be considered as higher risk from a financial crime perspective? (Choose three.)

Options:

A.

Forming a trust on behalf of a customer with a complex setup and acting as a nominee director

B.

Auditing a firm that provides payroll software to large corporate customers

C.

Preparing financial statements for a listed or a privately owned firm

D.

Providing tax advice to an international customer hoping to move their assets out of their home country

E.

Assisting an offshore corporation from a jurisdiction with no available beneficial owner information to buy property in the UK

Buy Now
Questions 31

Which control would be most effective as part of a risk-based approach (RBA) to managing AML/CFT risk for a bank established in the EU that also has a branch in a high-risk third country outside of the EU?

Options:

A.

Fully rely on central beneficial owner registry records in the high-risk third country to determine the ultimate beneficial owners of all customers

B.

Apply tailored due diligence measures, based on the level of risk posed by each customer following risk assessment

C.

Monitor every cross-border transaction in real time, flagging all for enhanced scrutiny due to the country risk level

D.

Automatically apply enhanced customer due diligence measures to all customers in the high-risk third-country branch regardless of risk level

Buy Now
Questions 32

A National Risk Assessment (NRA) can impact a financial institution's (Fl's) risk-based approach to anti-money laundering and terrorism financing by:

Options:

A.

dictating what predicate offences must be considered in the Fl's risk assessment.

B.

providing guidance on the types of customers and transactions that pose the highest risk.

C.

defining exactly what policies and procedures must be implemented.

D.

determining the maximum fines that can be imposed for AML violations.

Buy Now
Questions 33

In a standard customer due diligence (CDD) process focused on financial inclusion, the Financial Action Task Force (FATF) Recommendations require: (Choose two.)

Options:

A.

identification of the customer's occupation.

B.

identification and verification of the customer's identity.

C.

identification of the customer's work address.

D.

identification of the beneficial owner.

E.

verification of the customer's credit history.

F.

[verification of the customer's income sources.

Buy Now
Questions 34

When making an independent determination on whether to close an account based on an internal Investigation, a financial institution (F1) should consider. (Select Five.)

Options:

A.

reputational risk.

B.

the customers personal relationships.

C.

the frequency of account activity

D.

the Fl's policies and procedures.

E.

the seriousness of the underlying conduct.

F.

correspondence with law enforcement

G.

the legal basis for closing the account.

Buy Now
Questions 35

According to guidelines issued by Basel Committee on Banking Supervision relating to corporate governance principles for banks, what is the role of the board of directors in addressing an institution's AML oversight and governance?

Options:

A.

The board of directors should be responsible for overseeing the management of the bank's compliance risk but not involved in establishing a compliance policy that explains the processes by which compliance risks are to be identified and managed throughout the organization.

B.

The board of directors should establish a compliance function and approve the bank's policies for identifying, assessing, monitoring, reporting, and advising on compliance risk.

C.

The compliance function must have sufficient authority, stature, independence, and resources to be effective on its own and should not have access to the board of directors.

D.

The compliance function should report directly to the CEO concerning the bank's compliance with applicable laws, rules, and standards and only update the board of directors on the bank's efforts in managing compliance risk when required.

Buy Now
Questions 36

A financial institution's transaction monitoring system flags an unusually high volume of international wire transfers originating from a small business account. The transfers are being sent to multiple jurisdictions known for limited regulatory oversight. Additionally, an employee reports suspicious behavior from the account holder during an in-person visit, where they requested a large cash withdrawal without providing a clear business justification. As part of the investigation, the compliance team must assess whether this activity is suspicious and determine the appropriate next steps.

Which of the following steps should be taken first in the investigation process to properly gather information and assess whether the transactions are suspicious?

Options:

A.

Review the transaction history of the account to identify patterns, including the frequency, destination, and purpose of the wire transfers

B.

Notify senior management and suggest account closure due to potential risks

C.

Immediately file a suspicious activity report (SAR) based on the employee's report of suspicious behavior

D.

Contact the customer directly to ask for clarification on the reason for the large cash withdrawal

Buy Now
Questions 37

The financial industry relies heavily on rules-based approaches to transaction monitoring to detect suspicious activities.

Scenario-based systems use technology and algorithms to identify: (Choose three.)

Options:

A.

fraudulent identities involving stolen or manufactured identification.

B.

suspicious behavior involving a transaction that occurs at an unusual time of day.

C.

hidden beneficial owners.

D.

transaction patterns involving transactions that exceed a certain dollar amount.

E.

anomalies involving a transaction that occurs in a location far away from the customer's usual spending patterns.

Buy Now
Questions 38

An institution is looking to alter an existing threshold-based monitoring scenario because it is generating too many alerts that do not yield suspicious activity reports.

Documentation submitted to the relevant committee for supporting this proposal should include details on: (Choose three.)

Options:

A.

evidence that the increased residual risk arising from the change is within the bank's risk appetite.

B.

approval by money-laundering reporting officer for the proposal.

C.

how many resources are spent on the less productive lower threshold and the associated costs.

D.

the number of cases that will not be filed and the resources that can be freed up for other tasks.

E.

minutes of meeting held with the regulator where agreement was obtained that the higher threshold was justified.

F.

historical analysis proving that the current scenario generates a disproportionate number of false positives.

Buy Now
Questions 39

Financial crime risk related to the use of "hawalas" can stem from: (Choose two.)

Options:

A.

remote verification of identity by third-party program managers

B.

heavy usage by senior political figures.

C.

heightened risks of returned transactions.

D.

informal networks used for cross-border transactions outside of the formal banking system

E.

difficulty in tracking the originator recipient, and source of transactions.

Buy Now
Questions 40

Common risks and red flags associated with trade finance clients may include: (Choose four.)

Options:

A.

account activity that is not consistent with the purpose of the account

B.

bills of lading matching the description of goods, quantities, and values with transshipment details justified

C.

transaction structures that appear unnecessarily complex

D.

trade documents, such as invoices and letters of credit, that are not clearly worded or are in foreign languages

E.

invoices with prices that are much higher than market price

F.

fluctuations in the pricing of standard goods and services

Buy Now
Questions 41

Which of the following are potential financial crime-related red flags when obtaining client data? (Choose three.)

Options:

A.

A client frequently submits financial statements much earlier than required appearing overly eager

B.

A client insists on using a personal bank account for business transactions despite being advised otherwise

C.

A new client shows a preference for minimal direct interaction and relies primarily on indirect communication methods, citing convenience or time constraints

D.

The client is a publicly listed company but very diversified

E.

The ultimate beneficial ownership is unclear

Buy Now
Questions 42

Perpetual KYC includes: (Choose two.)

Options:

A.

triggers identifying static data changes and data based on client's behaviors in real time.

B.

periodic refreshing at one-, three- and five-year cycles.

C.

ability to prioritize better based on client data rather than driven by schedules alone.

D.

classification of clients into categories of risk.

Buy Now
Questions 43

Money services businesses (MSBs), payment service providers, and e-commerce platforms usually have a high volume of daily transactions.

What are the risks associated with these types of businesses? (Choose two.)

Options:

A.

These businesses are all cash intensive, increasing the risk of financial crime

B.

KYC challenges arise because e-commerce platforms face global customers making customer due diligence complex and resource intensive

C.

These businesses are highly regulated and therefore have no reason to be non-compliant as this would put them at risk of sanctions and fines

D.

Criminals can make use of identify fraud to fulfill KYC processes for layering purposes

E.

The settlement systems of these businesses are not sophisticated enough to cope with the high transaction volume

Buy Now
Questions 44

Upon learning of a potential weakness through an organization's enterprise-wide sanctions risk assessment relating to a low number of sanctions screening alerts generated compared to the business size and operations identified, which action would best ensure the risk area is properly managed and remediated to the best possible extent?

Options:

A.

Reviewing the enterprise-wide risk assessment methodology

B.

Enhancing staff training on the documentation of justification on closed alerts

C.

Revisiting the post-transaction monitoring system parameters and thresholds

D.

Reviewing the fuzzy logic currently adopted in the screening system

Buy Now
Questions 45

Which of the following controls is typically implemented at customer onboarding to mitigate the risk of onboarding high-risk customers?

Options:

A.

Enhanced due diligence (EDD)

B.

Transaction monitoring

C.

Customer risk assessment

D.

Sanctions screening

Buy Now
Questions 46

A national risk assessment (NRA) can impact the risk-based approach (RBA) within an organization's anti-financial crime (AFC) compliance program by: (Choose two.)

Options:

A.

helping to identify high-risk sectors that require enhanced due diligence (EDO),

B.

eliminating the need for sectoral risk assessments within the organization

C.

guiding the allocation of resources for mitigating financial crime risks

D.

requiring all organizations to apply standardized measures

E.

automatically reducing the organization's responsibility for conducting its own risk assessment

Buy Now
Questions 47

Which external data source is most reliable for verifying beneficial ownership during onboarding?

Options:

A.

Adverse media databases

B.

Publicly available information on non-government data repositories

C.

Credit reference agencies

D.

Beneficial ownership registers available in country of incorporation of entity

Buy Now
Questions 48

Which action could be taken by an organization to better understand the threats faced from proliferation financing?

Options:

A.

Work with the front-line to understand their strategic growth targets specifically aimed at increasing their market share around military technology and dual-use products

B.

Review the organization's sanction risk assessment to better understand the potential for exposure to Russia and the Democratic People's Republic of Korea

C.

Read and analyze the most recent National Proliferation Financing Risk Assessment produced by the relevant body of the organization's jurisdiction

D.

Undertake a detailed review of all payment-related transactions to any clients identified as defense contractors, paying special attention to the beneficial owners of those clients

Buy Now
Questions 49

Which of the following actions is specifically permitted or required under FinCEN section 314(b) for financial institutions (FIs) to enhance their efforts in combating money laundering and terrorist financing?

Options:

A.

FIs may disclose customer information to any third party

B.

FIs may provide information about their internal compliance programs to law enforcement agencies without any limitations

C.

FIs are required to report all transactions involving foreign entities to FinCEN so that FinCEN can share this information with other financial institutions

D.

FIs may share information about suspected money laundering activities with other FIs to aid in identifying and reporting suspicious transactions

Buy Now
Questions 50

Which risks inherent to real estate sector carry the highest AML/CFT risk? (Select Two.)

Options:

A.

Use of cash to purchase property

B.

Unlicensed real estate agents acting as front companies

C.

Use of a registered trust for the purchase of property

D.

Use of a company for the purchase of property

E.

Manipulation of the value of a property

Buy Now
Questions 51

A Financial Intelligence Unit (FIU) serves as a national center for the receipt and analysis of suspicious activity reports (SARs) and can obtain additional information from other reporting entities relevant to:

Options:

A.

public administration.

B.

legal assessment.

C.

law enforcement.

D.

legal activity.

Buy Now
Questions 52

Which of the following is a critical consideration for private sector firms when sharing data and intelligence to combat financial crime?

Options:

A.

The preference of upper management regarding which teams should participate in the data-sharing initiative

B.

The cost of the data-sharing system and whether it its within the existing IT budget

C.

The potential return on investment (ROI) from the data shared versus the financial crime prevention effort

D.

Ensuring that the shared data complies with applicable data protection regulations while maintaining the integrity and accuracy of the information

Buy Now
Questions 53

Which of the following is a primary objective of public sector groups in the fight against money laundering?

Options:

A.

Advising private financial institutions on how to enhance their profitability through AML efforts

B.

Establishing and enforcing legal frameworks to detect, prevent, and punish money laundering and related financial crimes

C.

Providing funding to private and non-governmental organizations (NGOs) for the development of advanced compliance technologies

D.

Acting as intermediaries between private sector firms and non-governmental organizations (NGOs) to streamline AML compliance programs

Buy Now
Questions 54

A compliance officer is reviewing an institutional banking prospect proposal for a new foreign entity that is a multinational business but headquartered in a country where most businesses are state-owned.

Which risks should be prioritized in the review? (Choose two.)

Options:

A.

Politically exposed persons (PEPs)

B.

Capital flight risk

C.

Anti-bribery and corruption risk

D.

Tax evasion

Buy Now
Questions 55

Common risks associated with cryptocurrency and convertible virtual currencies include: (Choose three.)

Options:

A.

funds being stolen from other users.

B.

obscuring the source of illicit funds.

C.

layering transactions to hide the origin of funds derived from illicit activity.

D.

difficulty converting into physical currency.

E.

facilitating payment for other illicit activities and goods.

Buy Now
Questions 56

A customer of a financial Institution (Fl) complained that they had received multiple emails appearing to originate from the Fl urging them to click on a link or open a remittance attachment for confirmation. After opening the attachment, the customer later realized that funds had been systematically transferred out of their bank account without their knowledge

Which type of cybercrime is described in this scenario?

Options:

A.

Vishing

B.

Pharming

C.

SMSishing

D.

Spear phishing

Buy Now
Questions 57

An organization is developing a comprehensive anti-money laundering (AML) framework.

Which of the following statements best describes the relationship between AML policies and procedures?

Options:

A.

Policies are broad guidelines. Procedures are detailed instructions for specific processes. Only procedures are mandatory for knowledge and adherence.

B.

Policies define the principles of an organization and influence the drafting of procedures. Procedures are detailed instructions for specific processes.

C.

Policies are detailed instructions for specific processes. Procedures are an overarching framework. Neither policies nor procedures are mandatory for knowledge and adherence.

D.

Policies are detailed instructions for specific processes. Procedures are an overarching framework. Both policies and procedures are mandatory for knowledge and adherence.

Buy Now
Questions 58

An AML compliance officer for a large bank has recently received an internal audit report on the private banking unit. The report revealed that the unit staff were not following risk-based due diligence procedures, so that the unit was not operating effectively.

Which immediate actions should the AML compliance officer consider to address these findings? (Select Two.)

Management Should implement a quality assurance program in the private banking unit

Options:

A.

Private bankers should receive training on AML procedures.

B.

All employees should receive refresher AML training.

C.

The board should review and approve a revised AML policy to change customer due diligence requirements in private banking.

D.

The legal department should conduct a review to assess potential legal consequences.

Buy Now
Questions 59

Which of the following is a broader risk specific to casinos and gambling?

Options:

A.

Low thresholds for transactions

B.

Frequent use of cash

C.

Cross-border transactions

D.

Weak KYC policies and procedures

Buy Now
Questions 60

A compliance officer is completing a case and has determined that the events do not merit filing a suspicious activity report (SAR).

Which of the following should be included in the case notes to justify not filing a SAR? (Choose two.)

Options:

A.

Who made the decision not to file the SAR

B.

Why the officer deemed that the case did not merit filing a SAR

C.

How much money was involved in the case

D.

How the money flowed through the institution

E.

When the unusual activity occurred

Buy Now
Questions 61

A legal instrument which is executed between two nations and governs cross-border information sharing Is known as a.

Options:

A.

mutual legal assistance treaty.

B.

memorandum of understanding.

C.

request for urgent information.

D.

declaration of understanding.

E.

memorandum of agreement.

Buy Now
Questions 62

Which regulation permits financial institutions, upon providing notice to the US Department of the Treasury, to share information with one another in order to identify and report activities that may involve money laundering or terrorist activity to the federal government?

Options:

A.

Regulation (EU) 2024/1624 of the European Parliament

B.

Collaborative Sharing of Money Laundering/Terrorism Financing (ML/TF) Information & Cases (COSMIC)

C.

USA Patriot Act Section 314(a)

D.

USA Patriot Act Section 314(b)

Buy Now
Questions 63

Which role within private banking has the best placement to identify and report money laundering risk?

Options:

A.

Investment advisor

B.

Relationship manager

C.

Operations manager

D.

Compliance officer

Buy Now
Questions 64

What is the first step in designing an effective controls framework using a risk-based approach?

Options:

A.

Establishing risk controls

B.

Assessing risk controls

C.

Ongoing risk monitoring

D.

Conducting a risk assessment

Buy Now
Questions 65

How should risk-related issues be addressed to ensure the effectiveness of the three lines of defense model?

Options:

A.

Ensure that the second line reviews, monitors, and escalates risk-related issues as needed to senior management while maintaining independent oversight from the third line

B.

Have senior management handle risk-related issues directly when possible because they are ultimately responsible for the organisation's overall risk management strategy

C.

Delegate some risk-related issues to the first line to avoid overwhelming the second line and to ensure operational efficiency

D.

Assign risk-related oversight duties to the third line to provide an independent review and address issues more effectively by avoiding conflicts of interest in the first and second lines

Buy Now
Questions 66

Which attributes are typically used to assess the vulnerability to money laundering risk of products offered by an insurer? (Choose three.)

Options:

A.

Purpose and intended use

B.

Liquidity

C.

Age of the beneficiary

D.

Customer anonymity or third-party transactions

E.

Length of waiting period

Buy Now
Questions 67

Which of the following measures can help maintain the independence of BSA/AML compliance staff to ensure effective compliance controls?

Options:

A.

Establishing BSA/AML compliance staff reporting to the management of the business line in the first line of defense

B.

Ensuring BSA/AML compliance staff is primarily outsourced

C.

Providing BSA/AML compliance staff a reporting line to compliance or other second line of defense internal control function

D.

Providing BSA/AML compliance staff with a reporting line to the chief financial officer

Buy Now
Questions 68

Which red flags apply to trade-based money laundering (TBML) schemes? (Choose three.)

Options:

A.

Use of wire transfers

B.

Loitering

C.

Instructions or involvement from third parties

D.

Amended letters of credit without reasonable justification

E.

Non-standard settlement arrangements

Buy Now
Exam Code: CAMS
Exam Name: Certified Anti-Money Laundering Specialist (CAMS7 the 7th edition)
Last Update: Oct 3, 2025
Questions: 229
CAMS pdf

CAMS PDF

$139.65  $399
CAMS Engine

CAMS Testing Engine

$157.15  $449
CAMS PDF + Engine

CAMS PDF + Testing Engine

$209.65  $599