An employee at a financial institution (Fl) suspects that one of their co-workers is involved in a financial investment scam syndicate. Which step should be taken next by the employee who has the suspicion?
Which risk factors are associated with acquiring and servicing the banking activities of customers considered higher risk for financial crime activities? (Select Three.)
A legal instrument executed between two nations that governs cross-border information sharing is known as a:
Which of the following ate efficient approaches lo performing horizon scanning? (Select Two.)
The United Nations Security Council (UNSC) is empowered to impose sanctions regimes against countries and terrorist organizations.
Which statements are true regarding sanctions imposed by the UNSC? (Select Two.)
In which of the following cases can a financial institution disclose a suspicious activity report (SAR)?
Which of the following are common indicators of possible money laundering within the securities industry? (Select Two.)
Which benefits are most commonly associated with transitioning from a rules-based approach to artificial intelligence (AI) and machine learning-based tools in transaction monitoring? (Choose three.)
What are the primary sources of reference besides AML laws and regulations when developing and maintaining the AML policies, standards, and procedures of a bank? (Choose three.)
Which of the following risk factors are considered by many supervisory authorities as representing a higher inherent risk associated with MSBs? (Select Two.)
Which line of defense would be tasked with interpreting new AML regulations and revising training for client-facing relationship managers?
According to the Egmont Group, which benefits do public-private partnerships (PPPs) provide to Financial Intelligence Units (FIUs)? (Select Three.)
Which of the following statements describe the strengths associated with public-private partnerships (PPPs)? (Choose two.)
Which characteristic of accountants is most attractive to those looking to launder funds using an accountant or accountancy firm?
Which of the following is a key consideration for a global organization when managing AFC and sanctions compliance across multiple jurisdictions?
Which of the following processes or tools contribute to AML compliance despite being seemingly unrelated? (Choose two.)
In which of the following situations would it be most crucial for the designated AML compliance officer of a company to perform a complete review of the company's AML program, including identifying the risks and commensurate controls?
When a financial institution (FI) is considering providing traditional banking services to a virtual asset service provider (VASP), consideration should be given to whether the FI: (Select Two.)
Which of the following statements best describes the financial crime risk associated with gatekeepers?
Which of the following are benefits of the latest KYC solutions, including but not limited to digital onboarding, eKYC, digital identity, facial recognition, liveness checks, biometrics, and geolocation? (Choose three.)
The primary objectives of the Financial Action Task Force (FATF) are to: (Choose two.)
A large international bank's chief compliance officer (CCO) is exploring ways to enhance the bank's ability to identify suspicious activities by using intelligence data more effectively. One potential solution is to engage in public-private partnerships (PPPs) to leverage shared intelligence and enhance collaboration with government agencies.
The bank considers joining a PPP initiative with the local Financial Intelligence Unit (FIU) and other financial institutions to improve its access to relevant data and intelligence. The CCO understands that while PPPs can provide significant benefits, such as improved risk detection and enhanced information sharing, there are also potential limitations, including data privacy concerns and differing priorities between public and private sector partners.
Which approach would best maximize the benefits of PPPs for the bank while mitigating the limitations associated with data sharing and intelligence?
The compliance officer at a casino in Taiwan discovers that the casino received multiple cash deposits from a customer just below the Large-Amount Transaction Report (LTR) limit on consecutive days. The customer used three different betting accounts.
What is the appropriate next step?
Which services provided by an accounting firm could be considered as higher risk from a financial crime perspective? (Choose three.)
Which control would be most effective as part of a risk-based approach (RBA) to managing AML/CFT risk for a bank established in the EU that also has a branch in a high-risk third country outside of the EU?
A National Risk Assessment (NRA) can impact a financial institution's (Fl's) risk-based approach to anti-money laundering and terrorism financing by:
In a standard customer due diligence (CDD) process focused on financial inclusion, the Financial Action Task Force (FATF) Recommendations require: (Choose two.)
When making an independent determination on whether to close an account based on an internal Investigation, a financial institution (F1) should consider. (Select Five.)
According to guidelines issued by Basel Committee on Banking Supervision relating to corporate governance principles for banks, what is the role of the board of directors in addressing an institution's AML oversight and governance?
A financial institution's transaction monitoring system flags an unusually high volume of international wire transfers originating from a small business account. The transfers are being sent to multiple jurisdictions known for limited regulatory oversight. Additionally, an employee reports suspicious behavior from the account holder during an in-person visit, where they requested a large cash withdrawal without providing a clear business justification. As part of the investigation, the compliance team must assess whether this activity is suspicious and determine the appropriate next steps.
Which of the following steps should be taken first in the investigation process to properly gather information and assess whether the transactions are suspicious?
The financial industry relies heavily on rules-based approaches to transaction monitoring to detect suspicious activities.
Scenario-based systems use technology and algorithms to identify: (Choose three.)
An institution is looking to alter an existing threshold-based monitoring scenario because it is generating too many alerts that do not yield suspicious activity reports.
Documentation submitted to the relevant committee for supporting this proposal should include details on: (Choose three.)
Financial crime risk related to the use of "hawalas" can stem from: (Choose two.)
Common risks and red flags associated with trade finance clients may include: (Choose four.)
Which of the following are potential financial crime-related red flags when obtaining client data? (Choose three.)
Money services businesses (MSBs), payment service providers, and e-commerce platforms usually have a high volume of daily transactions.
What are the risks associated with these types of businesses? (Choose two.)
Upon learning of a potential weakness through an organization's enterprise-wide sanctions risk assessment relating to a low number of sanctions screening alerts generated compared to the business size and operations identified, which action would best ensure the risk area is properly managed and remediated to the best possible extent?
Which of the following controls is typically implemented at customer onboarding to mitigate the risk of onboarding high-risk customers?
A national risk assessment (NRA) can impact the risk-based approach (RBA) within an organization's anti-financial crime (AFC) compliance program by: (Choose two.)
Which external data source is most reliable for verifying beneficial ownership during onboarding?
Which action could be taken by an organization to better understand the threats faced from proliferation financing?
Which of the following actions is specifically permitted or required under FinCEN section 314(b) for financial institutions (FIs) to enhance their efforts in combating money laundering and terrorist financing?
Which risks inherent to real estate sector carry the highest AML/CFT risk? (Select Two.)
A Financial Intelligence Unit (FIU) serves as a national center for the receipt and analysis of suspicious activity reports (SARs) and can obtain additional information from other reporting entities relevant to:
Which of the following is a critical consideration for private sector firms when sharing data and intelligence to combat financial crime?
Which of the following is a primary objective of public sector groups in the fight against money laundering?
A compliance officer is reviewing an institutional banking prospect proposal for a new foreign entity that is a multinational business but headquartered in a country where most businesses are state-owned.
Which risks should be prioritized in the review? (Choose two.)
Common risks associated with cryptocurrency and convertible virtual currencies include: (Choose three.)
A customer of a financial Institution (Fl) complained that they had received multiple emails appearing to originate from the Fl urging them to click on a link or open a remittance attachment for confirmation. After opening the attachment, the customer later realized that funds had been systematically transferred out of their bank account without their knowledge
Which type of cybercrime is described in this scenario?
An organization is developing a comprehensive anti-money laundering (AML) framework.
Which of the following statements best describes the relationship between AML policies and procedures?
An AML compliance officer for a large bank has recently received an internal audit report on the private banking unit. The report revealed that the unit staff were not following risk-based due diligence procedures, so that the unit was not operating effectively.
Which immediate actions should the AML compliance officer consider to address these findings? (Select Two.)
Management Should implement a quality assurance program in the private banking unit
A compliance officer is completing a case and has determined that the events do not merit filing a suspicious activity report (SAR).
Which of the following should be included in the case notes to justify not filing a SAR? (Choose two.)
A legal instrument which is executed between two nations and governs cross-border information sharing Is known as a.
Which regulation permits financial institutions, upon providing notice to the US Department of the Treasury, to share information with one another in order to identify and report activities that may involve money laundering or terrorist activity to the federal government?
Which role within private banking has the best placement to identify and report money laundering risk?
What is the first step in designing an effective controls framework using a risk-based approach?
How should risk-related issues be addressed to ensure the effectiveness of the three lines of defense model?
Which attributes are typically used to assess the vulnerability to money laundering risk of products offered by an insurer? (Choose three.)
Which of the following measures can help maintain the independence of BSA/AML compliance staff to ensure effective compliance controls?
Which red flags apply to trade-based money laundering (TBML) schemes? (Choose three.)