3 Months Free Update
3 Months Free Update
3 Months Free Update
What Is the purpose of applying learning(ML)or artificial Intelligence (Al)within a compliance framework? (Select two.)
Under DIFC AML rules, which governance body must approve the firm’s business-wide risk assessment?
What is indirect exposure in regards to blockchain analytics transaction monitoring?
Which privacy-enhancing feature hides both the sender and receiver in a transaction?
How does law enforcement use Suspicious Activity Reports (SARs)? (Select Two.)
Which first step should a VASP take upon detecting repeated transactions to a high-risk wallet?
A customer who runs a cryptoasset automated teller machine (ATM) comes into a financial institution and deposits a larger than usual amount. When asked about the deposit, the customer answers there has been broader adoption of cryptoassets in the region where the ATM is located. Which additional information about the business would indicate high risk for money laundering? (Select Two.)
Which key type of information allows financial intelligence units to combat the risk of anonymity in virtual currencies?
Which activity should be detected as a red flag during the customer onboarding stage and further investigated?
According to me Financial Action Task Force's (FATF's> definition of virtualasset service provider (VASP), for which activityis an entity required to be licensee or registered as a VASP in the jurisdiction(s) where they are created?
Which consensus mechanism uses staked tokens to validate transactions instead of computational power?
According to the Financial Crimes Enforcement Network's Guidance 2019-G0001 pertaining to convertible virtual currencies, a money transmitter includes companies that:
Which are common red flags that indicate fraudulent activity in a decentralized finance marketplace? (Select Two.)
What methods do criminals use to avoid clustering of crypto wallet addresses?
Which are essential components of an AML program for Customer Due Diligence (CDD)? (Select Three.)
Which type of cryptoasset is explicitly designed to maintain a stable value?
A firm using blockchain analytics finds an address that sent funds through multiple hops before reaching a darknet market wallet. This is an example of:
According to the Financial Action Task Force report, "Virtual Assets Red Flag Indicators", which activity is a red flag related to anonymity?
A compliance officer is conducting an AML risk assessment of two different operating models: a centralized cryptoasset exchange and a decentralized cryptoasset exchange. Which key difference causes the compliance officer to risk-rate the decentralized exchange higher than the centralized exchange?