Which risk category covers threats from ransomware actors demanding payment in cryptoassets?
Which are essential components of an AML program for Customer Due Diligence (CDD)? (Select Three.)
Which activity should be detected as a red flag during the customer onboarding stage and further investigated?
Which advantage ofthe proofof work consensus algorithm is widely applicable in many cryptocurrencies and other blockchainsystems?
Which of the following are red flag indicators specifically related to anonymity? (Select Two.)
Under DIFC AML rules, which governance body must approve the firm’s business-wide risk assessment?
Which key type of information allows financial intelligence units to combat the risk of anonymity in virtual currencies?
Which type of blockchain is jointly operated by multiple pre-approved organizations?
Which operational risk mitigation practice by virtual asset service providers (VASPs) is most effective when considering their relationships with other VASPs?
Which scenario most likely indicates potential active involvement of a customer in virtual asset related scam activities?
Which key differences between the Bitcoin and Ethereum blockchains must investigators consider when investigating flows of funds on each respective chain? (Select Two.)
How should an investigator use transaction history to determine whether cryptoassets were previously involved in money laundering?
Which blockchain characteristic makes forensic tracing of transactions possible?
Which blockchain features built-in privacy measures to prevent tracing and conceal ownership and flow of illicit funds?
Which metric is most relevant for assessing liquidity risk in a cryptoasset exchange?
According to me Financial Action Task Force's (FATF's> definition of virtualasset service provider (VASP), for which activityis an entity required to be licensee or registered as a VASP in the jurisdiction(s) where they are created?
Which blockchain feature ensures that once a block is added, it cannot be altered without network consensus?
Which features are used by anonymity-enhanced cryptoassets to reduce transparency of transactions and identities? (Select Two.)
Which governance function is ultimately responsible for approving AML/CFT policies?
An investigations manager at a cryptoasset exchange is developing an AML risk-rating framework for cryptoassets under consideration for support by the exchange. Which criteria is most important for rating the residual AML risk of a particular cryptoasset?
An analyst at a virtual asset service provider (VASP) that white-labels its exchange solution to other cross-border VASPs is developing a VASP onboarding procedure. Under Financial Action Task Force Recommendation 13, which CDD practices should be applied to such relationships? (Select Three.)