Halloween Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

CAMS PDF

$119.7

$399

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CAMS PDF + Testing Engine

$179.7

$599

3 Months Free Update

  • Exam Name: Certified Anti-Money Laundering Specialist (CAMS7 the 7th edition)
  • Last Update: Oct 30, 2025
  • Questions and Answers: 313
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CAMS Engine

$134.7

$449

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CAMS Practice Exam Questions with Answers Certified Anti-Money Laundering Specialist (CAMS7 the 7th edition) Certification

Question # 6

It is essential to identify any "family members" or "close associates" of politically exposed persons (PEPs) as part of the KYC/CDD process because they could be:

A.

executing cross-border transactions for their own business which is not commensurate to the PEP's wealth.

B.

in a position to provide more information regarding the PEP's whereabouts and hidden properties.

C.

travelling to offshore jurisdictions often on holiday which exposes them to higher risks for AML.

D.

used as intermediaries to facilitate bribery or corruption or to conceal the illicit wealth of the PEP.

Full Access
Question # 7

According to the Financial Action Task Force (FATF) Recommendation regarding "tipping off," which of the following statements accurately describes the obligations of reporting entities?

A.

Reporting entities are prohibited from disclosing to clients or third parties that a suspicious activity report (SAR) has been filed or that an investigation is ongoing

B.

Reporting entities can share general information about suspicious activities internally within the organization without compromising confidentiality

C.

Reporting entities must inform their clients if a suspicious activity report (SAR) has been filed, as part of maintaining transparency in customer relations

D.

Reporting entities are allowed to discuss suspicious activities with clients if it helps clarify a situation before submitting a suspicious activity report

Full Access
Question # 8

A legal instrument which is executed between two nations and governs cross-border information sharing Is known as a.

A.

mutual legal assistance treaty.

B.

memorandum of understanding.

C.

request for urgent information.

D.

declaration of understanding.

E.

memorandum of agreement.

Full Access
Question # 9

Which of the following are potential financial crime-related red flags when obtaining client data? (Choose three.)

A.

A client frequently submits financial statements much earlier than required appearing overly eager

B.

A client insists on using a personal bank account for business transactions despite being advised otherwise

C.

A new client shows a preference for minimal direct interaction and relies primarily on indirect communication methods, citing convenience or time constraints

D.

The client is a publicly listed company but very diversified

E.

The ultimate beneficial ownership is unclear

Full Access
Question # 10

A bank is completing a periodic KYC profile review for a customer that is a small digital marketing company based in New York City.

Which of the following would be a red flag?

A.

The account activity includes deposit activity into both savings and checking accounts

B.

The account activity includes incoming funds transfers at irregular intervals from small businesses located in New York

C.

The account activity includes deposits made in multiple branches around New York City into the same account.

D.

The account activity includes frequent purchases of tickets to industry conferences and other events.

Full Access
Question # 11

The recently appointed senior money laundering reporting officer (MLRO) at a newly opened small digital bank has been instructed by the group chief compliance officer to implement an effective AML transaction monitoring system that can identify unusual and suspicious transactions.

What are important considerations for the project to select and implement the AML transaction monitoring system at the digital bank? (Select Two.)

A.

Whether the vendor has documented appropriate internal controls for designing system and data integration schema

B.

Whether the permissions and user access settings for reviewing, investigating, and reporting details of alerts generated by the system are commensurate with those in use at other banks

C.

Whether the monitoring system is adequate with respect to the bank's size, activities, complexity, and risks

D.

Whether the monitoring system can be configured to enable the bank to execute trend analysis of transaction activity and to identify unusual business relationships and transactions

Full Access
Question # 12

A high volume of incoming wire transfers generates an alert about a client. The funds are immediately debited by cash withdrawals and outgoing wire transfers.

Which information should be reviewed first to investigate this alert/case?

A.

Open source information

B.

Customer profile

C.

Adverse media search

D.

Account activity

Full Access
Question # 13

The chief compliance officer at a global bank that operates in the US, EU, and other countries is responsible for navigating the US and EU regulations related to anti-money laundering (AML) and sanctions as well as any local regulations in the countries where it operates.

What should be the primary compliance concern of the bank?

A.

US anti-money laundering regulations are stricter than the EU AML Directives, making it easier for the global bank to be compliant in the EU

B.

US and EU regulations require the bank to build separate compliance teams, making it necessary to establish completely separate systems for US and EU operations

C.

The EU's sanctions regime is stricter than that of the US Office of Foreign Assets Control (OFAC), so the bank must prioritize compliance with EU regulations over US laws and train the staff in Europe accordingly

D.

Balancing compliance with the US BSA and OFAC sanctions while ensuring adherence to EU AML directives and the GDPR, which complicates cross-border data sharing

Full Access
Question # 14

When assessing and managing money laundering risks while operating in foreign jurisdictions different from that of the head office, an effective AML monitoring program should:

A.

Be consistent with the head office audits

B.

Be tailored to the higher of standards between the jurisdictions.

C.

Conform to the foreign jurisdiction policies to align with the head office policies.

D.

Provide all foreign jurisdiction reports to the head office for approval.

Full Access
Question # 15

A compliance officer is developing management reporting information to provide leadership with insights into the financial crime risk related to an institution's customer population.

Which of the following is a key risk indicator to include in the reporting to allow leadership to monitor whether there are any key changes to the inherent risk of the customer population? (Choose two.)

A.

Percentage of regulatory reports for high-risk customers not completed within the required regulatory deadlines

B.

Percentage change of transaction monitoring alerts escalated for investigation compared to the previous quarter

C.

Percentage of customers for whom onboarding verification was not completed within KYC policy service-level agreement (SLA) requirements

D.

Number and percentage of senior politically exposed persons (PEPs) who were onboarded in the past quarter compared to all active customers

Full Access
Question # 16

What is the relationship between the EU Anti-money Laundering Directives (AMLD) and local anti-money laundering (AML) regulations in European Union (EU) member states, in terms of their relevance for, applicability to, and impact on EU banks? (Select Two.)

A.

The EU AMLD and local AML regulations are separate and unrelated legal frameworks.

B.

The EU AMLD and local AML regulations must have identical requirements.

C.

Local AML regulations may impose additional or more stringent requirements than the EU AMLD.

D.

The EU AMLD take precedence over local AML regulations.

E.

Local AML laws and regulations override the requirements of the EU AMLD.

F.

The EU AMLD provide a framework that member countries must implement through local AML regulations.

Full Access
Question # 17

According to the Financial Action Task Force (FATF). potential risk indicators related to money laundering proceeds from environmental crimes include. (Select Two.)

A.

waste management sector companies based in high-risk jurisdictions with payments or trade invoices tor types of waste aligned with those they are authorized to process.

B.

frequent payments from companies in the logging. milling, or waste trade sectors to individuals or beneficiaries unrelated to the legal parson activity or business.

C.

unexplained wealth and cash transfers involving senior officials or politically exposed persons for their family members) with a position of responsibility related to the management or preservation of natural resources.

D.

small cash transfers from cash-Intensive businesses to beneficiaries in areas known as a source of gold mining, illegal logging, and Illegal land clearing.

Full Access
Question # 18

Which key metric would provide the most valuable data to the senior management of a financial institution about the effectiveness of its AML controls?

A.

The ratio of true positives to false positives generated by the automated monitoring system

B.

The number of money laundering alerts generated by the watchlist screening system

C.

The number of high-risk customers onboarded each month

D.

The number of clients exited for commercial reasons

Full Access
Question # 19

Which section of the USA PATRIOT Act relates to forfeiture of funds and allows for extraterritorial reach?

A.

Section 319(b)

B.

Section 314(b)

C.

Section 314(a)

D.

Section 319(a)

Full Access
Question # 20

A compliance analyst has recently investigated an account where money was deposited in amounts below the reporting limit and almost entirely withdrawn in a foreign country.

Which type of money laundering is the compliance analyst potentially identifying?

A.

Trade-based

B.

Check Kiting

C.

Microstructuring

D.

Structuring

Full Access
Question # 21

A law enforcement agency submits several requests to a financial institution.

Which request is legitimate and requires the bank to respond?

A.

Keep an account open upon verbal request

B.

Produce documents and testimony without a subpoena

C.

Seize privileged documents upon written request

D.

Freeze an account in terms of a court order

Full Access
Question # 22

The goal of the Egmont Group of Financial Intelligence Units (FIUs) is to provide a forum for FIUs to: (Select Three.)

A.

Securely share sensitive information in the fight against money laundering and the financing of terrorism

B.

Establish an environment to foster trust amongst countries

C.

Sign memoranda of cooperation that recognize and allow room for case-by-case solutions to specific problems

D.

Improve global cooperation between FIUs

E.

Propose legislation to combat financial crime, including money laundering and the financing of terrorism

Full Access
Question # 23

A legal instrument executed between two nations that governs cross-border information sharing is known as a:

A.

Memorandum of Agreement.

B.

Declaration of Understanding.

C.

Memorandum of Understanding.

D.

Mutual Legal Assistance Treaty.

E.

Request for Urgent Information.

Full Access
Question # 24

How does the Financial Action Task Force (FATF) measure the effectiveness of a country's efforts to combat money laundering and terrorist financing?

A.

FATF Evaluation Committee

B.

Series of internal audits followed by reporting to FATF

C.

Basel Committee

D.

Mutual evaluation

Full Access
Question # 25

A customer of a financial Institution (Fl) complained that they had received multiple emails appearing to originate from the Fl urging them to click on a link or open a remittance attachment for confirmation. After opening the attachment, the customer later realized that funds had been systematically transferred out of their bank account without their knowledge

Which type of cybercrime is described in this scenario?

A.

Vishing

B.

Pharming

C.

SMSishing

D.

Spear phishing

Full Access
Question # 26

Which statement best describes a key money laundering risk associated with virtual asset service providers (VASPs), cryptoassets, and related products?

A.

Cryptoassets can be transferred across borders quickly, but the volatility of their value still makes them less attractive for money laundering compared to traditional assets

B.

Mandatory reporting requirements have been implemented for certain types of crypto transactions, but gaps in regulation and enforcement still leave room for money laundering activities.

C.

The transparency of blockchain technology helps law enforcement trace transactions, but it can also provide criminals with ways to obscure their financial activities through complex layering techniques.

D.

The pseudonymous nature of transactions allows criminals to hide their identities while transferring large sums of money globally, making it difficult to trace the ultimate beneficial owner.

Full Access
Question # 27

Public-private partnerships (PPPs) that involve the sharing of information between law enforcement authorities, Financial Intelligence Units (FIUs), and the private sector are established to: (Select Two.)

A.

Exchange operational information between public authorities and obliged entities

B.

Exchange strategic information between FIUs and obliged entities

C.

Exchange strategic information between financial institutions

D.

Create a common database of key information and share analysis of suspicious activities with FATF

Full Access
Question # 28

An employee in a corporation's finance department hears news of an internal investigation into potential fraud within the company, quits her job, and disappears.

If they had been observed before her resignation, which characteristics of the employee would have been considered red flags? (Select Two.)

A.

The employee was originally from a high-risk jurisdiction

B.

The employee had friends in high-risk industries

C.

The employee had a lavish lifestyle for her income

D.

The employee was constantly evasive about the reasons for leaving her previous corporate finance job

Full Access
Question # 29

The financial industry relies heavily on rules-based approaches to transaction monitoring to detect suspicious activities.

Scenario-based systems use technology and algorithms to identify: (Choose three.)

A.

fraudulent identities involving stolen or manufactured identification.

B.

suspicious behavior involving a transaction that occurs at an unusual time of day.

C.

hidden beneficial owners.

D.

transaction patterns involving transactions that exceed a certain dollar amount.

E.

anomalies involving a transaction that occurs in a location far away from the customer's usual spending patterns.

Full Access
Question # 30

When a multinational organization develops its anti-financial crime (AFC) program, what is the most important consideration for ensuring compliance across different jurisdictions?

A.

Ensuring sanctions coy on international bodies like the UN because there is no requirement to adhere to local laws.

B.

Ensuring group policies and procedures prioritize adherence to US regulations because they are the most influential worldwide.

C.

Applying global AFC and sanctions policies to ensure consistency without the need to adapt to local regulations.

D.

Ensuring group policies cater to compliance with each country's specific AML and sanctions regulations.

Full Access
Question # 31

Which practices should financial institutions (FIs) adopt for the process of terminating customer relationships? (Choose three.)

A.

Utilizing a flexible communication style that adapts to different customer situations during the termination process

B.

Implementing a standardized procedure for customer termination that includes risk assessments and necessary documentation

C.

Performing a final review of a customer's transaction history and records to address any unresolved issues prior to termination

D.

Keeping records of the termination process, including the justification for the decision and any correspondence with the customer

E.

Notifying the customer of the termination decision only after completing the termination process to prevent possible disputes

Full Access
Question # 32

When selecting an anti-financial crime (AFC) tool for an organization, the most important factor to consider is whether the tool:

A.

integrates seamlessly with existing systems and processes.

B.

meets budget and cost requirements.

C.

automates all regulatory reporting requirements.

D.

replaces manual compliance training for employees.

Full Access
Question # 33

Which is a key goal of the EU's Directives on money laundering?

A.

Address control of payments in EU countries to reduce money laundering.

B.

Build a network of financial institutions that work together to prevent money laundering across the EU.

C.

Establish a consistent regulatory environment across the EU to prevent money laundering.

D.

Allow member states to discuss the draft legislation with the cooperation of the EU financial intelligence units.

Full Access
Question # 34

Which external data source is most reliable for verifying beneficial ownership during onboarding?

A.

Adverse media databases

B.

Publicly available information on non-government data repositories

C.

Credit reference agencies

D.

Beneficial ownership registers available in country of incorporation of entity

Full Access
Question # 35

Interactions between the compliance department and other functions or departments within an organization contribute to making the anti-financial crime (AFC) compliance program more robust by addressing specific risk areas.

Which departments play a crucial role in enhancing the AFC compliance program of an organization? (Select Two.)

A.

Information security office (ISO)

B.

Marketing and sales

C.

Human resources (HR)

D.

Data privacy office (DPO)

Full Access
Question # 36

An internal audit team is reviewing the anti-financial crime (AFC) program of its firm.

Which of the following attributes of the third line of defense would be most critical to ensure unbiased and effective oversight?

A.

Consistency of approach

B.

Periodic training of the function

C.

Qualification of the team

D.

Independent testing

Full Access
Question # 37

A law enforcement action alleged that on several trading days over the course of two months, defendants engaged in a series of copper gold, crude oil. and natural gas futures transactions on an electronic trading platform One defendant repeatedly bought future contracts at low prices from the other, and then immediately sold them back at higher prices. As a result, one defendant effectively pocketed the same amount as the other lost even though there were no changes in the open positions held by either defendant.

What is a name for this typology?

A.

Short position

B.

Reverse flip

C.

Bid-ask spread

D.

Wash trading

Full Access
Question # 38

Which of the following statements is true regarding Office of Foreign Assets Control (OFAC) sanctions? (Select Two.)

A.

Sanctions can only be placed on certain individuals in foreign countries as designated by OFAC

B.

Blocked funds must be placed into an interest-bearing account on a financial institution's books

C.

Sanctions can be either comprehensive or selective using the blocking of assets and trade restrictions to accomplish foreign policy and national security goals

D.

OFAC sanctions automatically expire after five years unless renewed by Congress

Full Access
Question # 39

The supply of goods and services can be vulnerable to corruption within a company, particularly the solicitation and receipt of bribes and kickbacks, because: (Choose two.)

A.

certain contractors may receive preferential treatment, allowing them opportunities to inflate margins during the tender process

B.

unsuccessful bidders are informed of decisions and provided detailed justifications for awarding the contracts

C.

procurement and contracting processes involve the management of the tender process, which may lack sufficient oversight

D.

bids are solicited and disseminated to a wide audience through advertising and other channels.

Full Access
Question # 40

Which statements regarding using network analysis tools to determine links to criminality are true? (Choose three.)

A.

When using network analysis data to fight money laundering and financial crime, data protection and privacy can be disregarded because fighting crime takes precedent

B.

Network analysis tools are an efficient means of generating relevant results because they only need a limited amount of data and computation power and artificial intelligence (Al) allows less-skilled people to quickly learn to use these systems

C.

When using artificial intelligence (Al) with network analysis tools, it must be ensured that the algorithms used are not biased towards social criteria, such as race, gender, or religion

D.

Network analysis allows for the identification of individuals or entities in a network by analyzing connections or links between them and can be used to study a wide range of systems, such as social or transportation networks

E.

Analyzing relationships between individuals in a social network allows for the identification of hierarchies, the detection of behaviors and geographical movements, or an understanding of how groups are organized

Full Access
Question # 41

Which of the following are common indicators of possible money laundering within the securities industry? (Select Two.)

A.

Receiving securities into an existing brokerage account following the death of a spouse

B.

Allowing fixed income securities to mature

C.

Using brokerage accounts like deposit accounts

D.

Engaging in transactions involving nominees or third parties

Full Access
Question # 42

A recruitment manager in the human resources department of a bank has shortlisted a candidate for the position of relationship manager in its private banking division. The compliance policy of the bank stipulates that proper background checks on new employees

must be completed by the recruiting team to protect the bank against potential risks, including fraud and money laundering.

Which resources would be most useful for identifying any potential negative information regarding the shortlisted candidate? (Select Three.)

A.

Criminal history searches

B.

Personal resume

C.

Internet and public media searches

D.

Past employment records

E.

Personal references from close associates

Full Access
Question # 43

During which process must a country demonstrate to the Financial Action Task Force (FATF) that it has an effective framework to protect the financial system from abuse?

A.

Formal assessment

B.

Regulatory overview

C.

Technical analysis

D.

Mutual evaluation

Full Access
Question # 44

Reference data screening includes the screening of which types of datasets? (Select Two.)

A.

Types of payment messages

B.

Customers

C.

Third-party service providers

D.

Customer spouses

Full Access
Question # 45

Why is it important to use multiple sanctions lists, such as United Nations (UN), Office of Foreign Assets Control ("OFAC"), and European Union ("EU") lists, in name screening systems?

A.

To avoid sanctions breach related to payments

B.

To avoid onboarding customers previously exited due to true match

C.

To meet international regulatory requirements and identify risks across jurisdictions

D.

To be in line with the risk appetite statement

Full Access
Question # 46

There are three types of factors that can be used to authenticate someone ownership, knowledge, and inherent factors.

Which of the following factors falls under inherent factors?

A.

Challenge-response

B.

Fingerprint

C.

Security token

D.

Passphrase

Full Access
Question # 47

Which of the following is a broader risk specific to casinos and gambling?

A.

Low thresholds for transactions

B.

Frequent use of cash

C.

Cross-border transactions

D.

Weak KYC policies and procedures

Full Access
Question # 48

What areas of laws and regulations have the greatest impact on AML/CFT applications? (Choose three.)

A.

Information security, data privacy, and cybersecurity

B.

Foreign exchange control, and precious gemstone and metal dealing

C.

Ombudsman and anti-competition authority

D.

Electronic contract and biological signature acceptance

E.

Consumer protection, financial inclusion, and environmental, social and governance

Full Access
Question # 49

A bank received a subpoena regarding one of its clients. The financial intelligence unit of the bank should review the subpoena and:

A.

Close the client's account by informing the client of the subpoena.

B.

Perform a transaction review and respond fully to the subpoena.

C.

File a suspicious activity report (SAR), including the receipt of the subpoena in the SAR narrative.

D.

Adjust the client's risk score and close the case.

Full Access
Question # 50

Business entities established in offshore financial centers (OFCs) pose unique risks for money laundering because they often:

A.

have informal business arrangements between persons or entities.

B.

are located in geographies that are not accountable to US laws.

C.

include trusts, investment funds, and insurance companies.

D.

have limited organizational disclosure and recordkeeping requirements for establishing these business entities.

Full Access
Question # 51

Using artificial intelligence (Al) and machine learning-based techniques tn adverse media screening can: (Choose three.)

A.

ensure that all adverse media sources are comprehensively analyzed without the need for human review.

B.

significantly reduce human errors arising from repetitive tasks by delivering consistent and highly accurate analysis.

C.

instantly identify intent behind media articles, allowing for more effective risk scoring.

D.

automate the process of identifying new information and distinguishing it from previously encountered data.

E.

cover multiple languages and scripts, surpassing the limitations of human linguistics.

Full Access
Question # 52

When a government imposes economic sanctions on a target the purpose is to:

A.

protect the rights of the citizens of the state target against their own government and improve financial stability in the region.

B.

indicate that the use of military force is likely unless the state or non-state target complies with the government's

C.

interests encourage non-governmental organizations to increase the provision of humanitarian and charitable aid to the target

D.

alter the behavior of the state or non-state target that threatens the interests of that government or violates international norms

Full Access
Question # 53

Which attributes are typically used to assess the vulnerability to money laundering risk of products offered by an insurer? (Choose three.)

A.

Purpose and intended use

B.

Liquidity

C.

Age of the beneficiary

D.

Customer anonymity or third-party transactions

E.

Length of waiting period

Full Access
Question # 54

The UN Security Council's primary role in imposing sanctions is that it has the authority to:

A.

impose sanctions to maintain or restore international peace and security.

B.

impose sanctions on countries that lack AML/CFT controls.

C.

conduct research on and analyze the impacts of sanctions to improve the effectiveness of sanctions regimes.

D.

impose sanctions on economic targets to maintain or restore financial stability within a country.

Full Access
Question # 55

A trust and company services provider that offers a variety of services to businesses is approached by a client interested in establishing a new company. The client requests assistance with the incorporation process, a local business address, annual maintenance services, and the designation of individuals to serve in official capacities for the new company.

Which of the following services involves a higher money laundering risk?

A.

Appointing individuals to serve in official capacities of the company

B.

Annual maintenance services

C.

Provision of a local business address

D.

Company incorporation services

Full Access
Question # 56

Upon learning of a potential weakness through an organization's enterprise-wide sanctions risk assessment relating to a low number of sanctions screening alerts generated compared to the business size and operations identified, which action would best ensure the risk area is properly managed and remediated to the best possible extent?

A.

Reviewing the enterprise-wide risk assessment methodology

B.

Enhancing staff training on the documentation of justification on closed alerts

C.

Revisiting the post-transaction monitoring system parameters and thresholds

D.

Reviewing the fuzzy logic currently adopted in the screening system

Full Access
Question # 57

An EU Trust and Company Service Provider analyst notices some unusual activity while looking through a customer's financial statements and detailed general ledger. The customer is in the business of importing and exporting machineries.

Which transaction indicator warrants further escalation to the compliance officer?

A.

The payment of company secretarial retainer fees to a foreign company in a tax-efficient jurisdiction

B.

The payment of virtual offices services overseas

C.

Inter-company loans from the holding company to the subsidiary company to finance the shipment of machinery

D.

The payment of consultancy fees to unrelated companies and service providers established in a foreign jurisdiction

Full Access
Question # 58

Arecruitment manager in the human resources departmentof a bank hasshortlisted a candidate for the position of relationship manager in its private banking division.

Thebank’s compliance policyrequiresproper background checksto protect againstfraud and money laundering risks.

Whichresourceswould bemost usefulfor identifying potential negative information regarding the shortlisted candidate? (Select Three.)

A.

Past employment records.

B.

Personal references from close associates.

C.

Personal resume.

D.

Internet and public media searches.

E.

Criminal history searches.

Full Access
Question # 59

The transaction monitoring system of a bank generated an alert for a car wash client. After making large cash deposits, the client orders international wire transfers.

Which additional circumstances would make the case more suspicious?

A.

The beneficiary of the wire transfers is a foreign company whose shareholders and director are other companies

B.

The wire transfers are for different amounts but with the same beneficiary

C.

The beneficiary of the wire transfer is a resident of a grey-list country

D.

The beneficiary of the wire transfers is a resident of a foreign country bearing the same family name as the business owner

Full Access
Question # 60

According to the Financial Action Task Force (FATF) report on terrorism financing, charities and nonprofit organizations are often vulnerable to terrorist financing because they: (Select Two.)

A.

Collect donations from various sources, and their primary objective is philanthropy and social wellbeing

B.

Are usually legitimate establishments and will not use the funds collected through donation for the profit of individuals or entities

C.

Have a global presence that provides a framework for national and international operations and financial transactions that are often in or near areas most exposed to terrorist activity

D.

Enjoy the public trust and have access to considerable sources of funds, and their activities are often cash intensive

Full Access
Question # 61

Which statement about the extraterritorial reach of US laws and legislation is accurate?

A.

The Bank Secrecy Act (BSA) extraterritorial reach requires that the Travel Rule be applied to all financial institutions globally, including all USD transactions

B.

The Anti-Money Laundering Act of 2020 (AML Act) extraterritorial reach covers all USD transactions throughout the global economy

C.

The Office of Foreign Assets Control's (OFAC's) economic and trade sanctions may pose extraterritorial risks for financial institutions and businesses outside of the US

D.

Section 319(b) of the USA PATRIOT Act extraterritorial reach permits the seizure of funds from a correspondent bank account in the US that have been opened and maintained for the foreign bank

Full Access
Question # 62

A multinational corporation is considering expanding into a new market with a history of political instability and corruption.

Which strategy would be most effective in mitigating reputational risk from a financial crime perspective associated with such an expansion?

A.

Ensure the jurisdiction risks and other relevant factors have been taken into consideration in the EWRA and the residual risks are within the corporation's risk appetite

B.

Partnering with established local businesses to leverage their knowledge and connections while sharing risks

C.

Ensuring the company has strong ties with local government officials to influence policy and avoid negative scrutiny

D.

Committing to open communication, ethical practices, and community engagement to build trust with stakeholders

E.

Minimizing the company's direct presence in the country to reduce exposure to potential risks

Full Access
Question # 63

Which of the following are benefits of the latest KYC solutions, including but not limited to digital onboarding, eKYC, digital identity, facial recognition, liveness checks, biometrics, and geolocation? (Choose three.)

A.

Guaranteeing 100% accuracy in regulatory compliance across all jurisdictions

B.

Improving customer satisfaction by offering personalized recommendations

C.

Reducing identity theft effectively

D.

Providing reliable customer authentication to enhance trust

E.

Decreasing the time required for customer authentication

Full Access
Question # 64

Which statement best describes an organizational challenge for law enforcement agencies and Financial Intelligence Units (FIUs) when conducting cross-border money laundering (ML) investigations?

A.

Defining a common communication approach and language between all involved parties.

B.

Delays in the investigation due to a foreign FIU awaiting the results of queries performed by third parties.

C.

Conducting an investigation in all countries through which ML funds were transferred when one or more of the countries do not have an FIU.

D.

Investigations which involve high-ranking politicians, who often have influence over the local FIU.

Full Access
Question # 65

Which of the following serves as an example of a successful public-private partnership (PPP)?

A.

The Financial Action Task Force (FATF)

B.

The AUSTRAC Fintel Alliance

C.

The Egmont Group

D.

The Wolfsberg Group

Full Access
Question # 66

Which collective body of Financial Intelligence Units (FlUs) was formed with an objective to improve Information exchange and sharing mechanisms among member FlUs as well as to support its members by enhancing their capabilities'?

A.

The Organisation for Economic Co-operation and Development (OECD)

B.

The Egmont Group

C.

The Wolfsberg Group

D.

The International Monetary Fund (IMF)

Full Access
Question # 67

The EU's 6th Anti-Money Laundering Directive (6AMLD):

A.

Extended AML oversight to crowdfunding platforms and professional football clubs

B.

Eliminated the requirement for the European Commission to conduct a risk assessment

C.

Created a central EU watchdog to combat money laundering

D.

Strengthened provisions relating to the accuracy of data submitted to central beneficial ownership registries

Full Access
Question # 68

Which operational situation might indicate that money laundering is occurring at or through a deposit-taking financial institution?

A.

The institution has observed an increase in customer demand for large-denomination banknotes.

B.

The institution maintains a sequentially numbered log of the monetary instruments it sells.

C.

The institution has observed a reduced settlement time in the transaction services that support the rapid movement or remittance of funds.

D.

The institution has observed an increase in the adoption of its digital products and services.

Full Access
Question # 69

What are the primary sources of reference besides AML laws and regulations when developing and maintaining the AML policies, standards, and procedures of a bank? (Choose three.)

A.

National Risk Assessment

B.

Regulatory guidance or publications

C.

Government or state-run newspapers

D.

Guidance issued by international bodies

E.

Policies and procedures developed by other banks

Full Access
Question # 70

What is the primary purpose of anti-bribery and corruption regulations?

A.

To prohibit the payment of anything of value by persons or entities to government officials or employees of state-owned enterprises to obtain an improper business advantage

B.

To prohibit the conversion of illegally obtained money into legal money by senior government figures

C.

To protect against election interference by corrupt foreign adversaries facilitated by illicit funds

D.

To protect against the use of illegal means by senior political figures to avoid paying taxes

Full Access
Question # 71

A key advantage of privacy enhancing technologies (PETs) in anti-money laundering is that they offer:

A.

simultaneous encryption and decryption for underlying data.

B.

full access to underlying data with full and uninterrupted calculations made on the data.

C.

secure processing of data while it remains encrypted.

D.

transfer, decryption and storage of data by the data processor.

Full Access
Question # 72

Which of the following processes or tools contribute to AML compliance despite being seemingly unrelated? (Choose two.)

A.

Customer loyalty program tracking

B.

Product usage analysis

C.

Customer satisfaction surveys

D.

Customer support ticket tracking

E.

Credit risk assessment

Full Access
Question # 73

Which of the following is a critical consideration for private sector firms when sharing data and intelligence to combat financial crime?

A.

The preference of upper management regarding which teams should participate in the data-sharing initiative

B.

The cost of the data-sharing system and whether it its within the existing IT budget

C.

The potential return on investment (ROI) from the data shared versus the financial crime prevention effort

D.

Ensuring that the shared data complies with applicable data protection regulations while maintaining the integrity and accuracy of the information

Full Access
Question # 74

Which money laundering risks are posed by the misuse of trust and asset management services? (Select Three.)

A.

Concealing sources of funds

B.

Allowing for third-party custody safekeeping of funds

C.

Adding a layer of anonymity to transactions

D.

Concealing true legal and beneficial owners

E.

Establishing escrow accounts for real estate transactions

Full Access
Question # 75

An AML compliance officer receives an independent audit report with a number of findings.

An appropriate response to the report would include:

A.

Drafting detailed action plans for the audit team to execute to close the findings

B.

Reperforming the testing for the controls mentioned in the findings to confirm the results of the audit

C.

Defining remedial actions based on the findings' root cause analysis

D.

Assigning responsibility for reviewing the action plan to the board of directors

Full Access
Question # 76

Money services businesses (MSBs), payment service providers, and e-commerce platforms usually have a high volume of daily transactions.

What are the risks associated with these types of businesses? (Choose two.)

A.

These businesses are all cash intensive, increasing the risk of financial crime

B.

KYC challenges arise because e-commerce platforms face global customers making customer due diligence complex and resource intensive

C.

These businesses are highly regulated and therefore have no reason to be non-compliant as this would put them at risk of sanctions and fines

D.

Criminals can make use of identify fraud to fulfill KYC processes for layering purposes

E.

The settlement systems of these businesses are not sophisticated enough to cope with the high transaction volume

Full Access
Question # 77

The owner of a real estate investment company deposits multiple cashier's checks that were bought using cash over a three-month period, from the sale of two apartments. This account also receives several electronic transfers from other financial institutions for US$10,000 each.

What activity is considered suspicious of money laundering?

A.

Receiving electronic transfers for US$10,000 amounts from other financial institutions

B.

Using cash to buy multiple cashier's checks over a period of time

C.

Performing operations with real estate investment companies

D.

Using cashier's checks in the transactions with the real estate investment company's account

Full Access
Question # 78

Which risk factors should a financial institution (FI) examine for a new corporate customer intending to open a new bank account? (Select Three.)

A.

All the financial institutions where the new customer currently banks or banked previously

B.

The type of business the corporate customer is engaged in

C.

The employment profiles and information of all employees of the new customer

D.

The country or location where the customer is from or conducts business

E.

The identity of senior managing officials and all individuals authorized to operate the account

Full Access
Question # 79

Which of the following scenarios describe common risk indicators of money laundering faced by operators of legitimate money services businesses (MSBs)? (Select Three.)

A.

A customer changes multiple high-denomination notes to low-denomination notes.

B.

A customer conducts cash transactions using multiple branches of the MSB on the same day.

C.

A customer has a family link to the destination of a money transfer

D.

A customer sends and receives money transfers in equal amounts at or about the same time.

E.

A customer only wants to deal with a particular employee in the MSB.

Full Access
Question # 80

An international bank is headquartered in Madrid, Spain with an office in New York City (NYC), US. The Madrid office is investigating a transaction originating from a customer of the NYC office and inquires whether the NYC office can share any relevant further information on the individual. Upon further research, the NYC office finds that they have filed a suspicious activity report (SAR) on the individual in the previous year.

Which factors need to be considered before sharing the requested information? (Select Two.)

A.

The foreign bank must always request approval by its national anti-financial crime authority to share any information cross-border.

B.

The bank should report this to the Financial Crimes Enforcement Network (FinCEN) and receive formal guidance before sharing the information.

C.

The bank should consider jurisdictional privacy requirements and its own policies and procedures to determine what information to share.

D.

The information should only be shared on a need-to-know basis.

Full Access
Question # 81

Which risks inherent to real estate sector carry the highest AML/CFT risk? (Select Two.)

A.

Use of cash to purchase property

B.

Unlicensed real estate agents acting as front companies

C.

Use of a registered trust for the purchase of property

D.

Use of a company for the purchase of property

E.

Manipulation of the value of a property

Full Access
Question # 82

An AML analyst at a financial institution is examining an alert generated by the automated transaction monitoring system to determine whether the alert should be escalated to the AML unit for further investigation or whether it can be archived as a false positive.

Which action might be reasonable for the AML analyst to take?

A.

Restrict the client's access to the account

B.

Request information from the relationship manager assigned to the account that caused the alert

C.

Perform below-the-line testing to ensure the automated monitoring system is operating effectively

D.

Send a request for information to the counterparty bank involved in the transaction that caused the alert

Full Access
Question # 83

Which of the following statements is true regarding the 2012 Financial Action Task Force (FATF) 40 Recommendations and'or 11 Immediate Outcomes?

A.

The 40 Recommendations have not been updated to reflect the impact of new technology

B.

Each jurisdiction can reach out to the FATF for private access to the interpretive notes to the 40 Recommendations

C.

The 11 Immediate Outcomes are recommendations specific to high-risk jurisdictions requiring enhanced monitoring.

D.

The cornerstone of the 40 Recommendations is the adoption of a risk-based approach by each jurisdiction

Full Access
Question # 84

It Is important for financial institutions (FIs) to be aware of anti-financial crime (AFC) and sanctions regulatory regimes in other jurisdictions in order to.

A.

maintain compliance with the AFC and sanctions requirements of all countries where the F1 operates or has business relationships and to avoid penalties for violations in foreign jurisdictions.

B.

ensure that sanctions regimes are applied selectively based on the regulatory standards of the countries where business activities occur, focusing primarily on aligned jurisdictions

C.

compensate for the limited applicability of AFC and sanctions regulations on cross-border transactions and their reduced relevance for domestic operations in other jurisdictions.

D.

ensure the F1 can manage business relationships in jurisdictions with stricter or more lenient regulations than their home country, allowing for operational flexibility

Full Access
Question # 85

Based on the AML principles outlined by the Wolfsberg Group, what do private and correspondent banks have in common when monitoring for terrorist financing?

A.

Cash access from a pre-paid card increases the potential that the card will be used for money laundering purposes.

B.

Transaction monitoring examines the relationship between due diligence information and account closings.

C.

Account and transactional activity are monitored after the proper identification and verification of customers.

D.

Numbered or alternate name accounts will only be accepted if the bank has established the identity of the client and beneficial owner.

Full Access
Question # 86

As emphasized in the Basel Committee guidance for "Sound management of risks related to money laundering and financing of terrorism", the third line of defense, or audit function, should:

A.

Conduct AML audits no less often than every 12 months for consistency in annual reporting.

B.

Remain independent from expressing opinions on the sufficiency of remediation or action plans to address findings and recommendations.

C.

Be involved in the day-to-day operations of the AML program to immediately prevent control failures.

D.

Report to the audit committee of the board of directors to maintain independence.

Full Access
Question # 87

The new KYC lead at a bank is particularly focused on enhancing the risk management component of its KYC program and refers to the Basel Committee's customer due diligence (CDD) principles.

Which of the following describe key improvements to a KYC program established in the Basel Committee's CDD principles? (Select Two.)

A.

Implementation of a blacklist of correspondent customers with previously detected and investigated suspicious activity

B.

Enhancement of a customer acceptance policy to more clearly identify high-risk customers

C.

Increased frequency of training provided to front office employees

D.

Enhancement of customer identification procedures to appropriately identify trust, nominee, and fiduciary accounts

Full Access
Question # 88

Which regulatory bodies cooperate when dealing with cross-border suspicious or unusual financial activity investigations?

A.

European Commissions

B.

Financial Action Task Forces

C.

Wolfsberg Groups

D.

Financial Intelligence Units

Full Access
Question # 89

Under the Egmont Group Principles, information exchange among financial intelligence units (FIUs) should be conducted:

A.

Without the expectation of reciprocity on how the information will be used.

B.

Only if the status of the foreign FIU is related to law enforcement.

C.

Freely, spontaneously, and upon request, on the basis of reciprocity.

D.

With set limits on the amount of financial and administrative information provided.

Full Access
Question # 90

Which control would be most effective as part of a risk-based approach (RBA) to managing AML/CFT risk for a bank established in the EU that also has a branch in a high-risk third country outside of the EU?

A.

Fully rely on central beneficial owner registry records in the high-risk third country to determine the ultimate beneficial owners of all customers

B.

Apply tailored due diligence measures, based on the level of risk posed by each customer following risk assessment

C.

Monitor every cross-border transaction in real time, flagging all for enhanced scrutiny due to the country risk level

D.

Automatically apply enhanced customer due diligence measures to all customers in the high-risk third-country branch regardless of risk level

Full Access
Question # 91

Which scenario best justifies why a customer's account might be closed by a financial institution?

A.

The customer is the object of a civil subpoena.

B.

The customer uses a shipping company dealing with specially designated nationals.

C.

The account shows periodic fixed amount remittances for tuition fees.

D.

The account has transactions that triggered multiple suspicious activity reports.

Full Access
Question # 92

The Financial Intelligence Unit (FIU) in a country has received a suspicious activity report (SAR) which involves significant suspicious fund transfers, not only within its jurisdiction but also in a foreign country. Further information is required from the foreign country to determine whether the matter needs to be referred for prosecution locally.

Which of the following statements is true in this scenario?

A.

It is against international laws on data protection to access information from foreign countries

B.

Sovereignty of nations means that information cannot be accessed from foreign countries

C.

Any information related to money laundering can be received from any organization at any time regardless of jurisdiction

D.

Countries that are members of the Egmont Group can request assistance for information from each other

Full Access
Question # 93

Which of the following is an important factor to consider when setting up an anti-financial crimes (AFC) compliance program governance structure?

A.

Ensuring the structure is reviewed by an outside auditor or consultant

B.

Establishing a system of internal controls commensurate with the institution’s size and complexity

C.

Designating a qualified board of directors to monitor day-to-day compliance

D.

Establishing clear roles and responsibilities for AFC risk escalations and issues

Full Access