Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

ACAMS CCAS Certified Cryptoasset Anti-Financial Crime Specialist Examination Exam Practice Test

Page: 1 / 10
Total 100 questions

Certified Cryptoasset Anti-Financial Crime Specialist Examination Questions and Answers

Question 1

What is the correct risk assessment equation used in AML/CFT compliance frameworks, including for cryptoasset risk evaluations?

Options:

A.

Inherent Risk – Control Effectiveness = Residual Risk

B.

Inherent Risk – Residual Risk = Control Effectiveness

C.

Residual Risk + Control Effectiveness = Inherent Risk

D.

Inherent Risk + Control Effectiveness = Residual Risk

Question 2

A compliance officer Is assigned a group of customers. Which action should the officer fake to determinethe appropriate level of customer due diligence apply to each customer?

Options:

A.

Assess only the money laundering risks posed by customer location

B.

Examine what Threshold for occasional transactions can be set for each customer.

C.

Implement the same COD measures for each customer.

D.

Take into account all risk variables such as me purpose of the account or relationship

Question 3

Under DIFC AML regulations, enhanced due diligence (EDD) ismandatorywhen:

Options:

A.

A customer is a domestic bank.

B.

The customer is from a high-risk jurisdiction.

C.

The transaction is above USD 1,000.

D.

The customer is a retail investor.

Question 4

Why should firms monitor “dusting” attacks?

Options:

A.

They slow blockchain performance.

B.

They can link anonymous wallets to known identities.

C.

They increase transaction fees.

D.

They inflate token supply.

Question 5

What is the intention of the Financial Action Task Force's (FATF's) Travel Rule?

Options:

A.

To enhance customer due diligence (CDD) procedures to ensure high quality data

B.

To slow down cryptoasset transactions to allow law enforcement to intervene

C.

To mitigate money laundering and terrorist financing (ML/TF) risk by increasing the ability to follow funds via different financial institutions

Question 6

Which governance function is ultimately responsible for approving AML/CFT policies?

Options:

A.

MLRO

B.

Board of Directors

C.

Compliance officer

D.

Chief Executive Officer

Question 7

Which level of an organization is ultimately responsible for risk oversight?

Options:

A.

1st line compliance team

B.

2nd line compliance team

C.

Chief risk officer

D.

Board of directors

Question 8

Which blockchain type is accessible only to a single organization?

Options:

A.

Public

B.

Private

C.

Consortium

D.

Hybrid

Question 9

Which type of cryptoasset is explicitly designed to maintain a stable value?

Options:

A.

Utility token

B.

Stablecoin

C.

Governance token

D.

Privacy coin

Question 10

Which features are used by anonymity-enhanced cryptoassets to reduce transparency of transactions and identities? (Select Two.)

Options:

A.

Proof-of-stake mining

B.

Automatic mixing

C.

Secure hashing algorithm 256

D.

Cryptographic enhancements

E.

MetaMask wallet

Question 11

What is the “Travel Rule” under FATF guidance?

Options:

A.

A requirement to record customer addresses for all crypto transfers

B.

A requirement to transmit originator and beneficiary information with crypto transfers above a threshold

C.

A requirement to freeze funds sent across borders

D.

A rule for declaring crypto holdings at customs

Question 12

Which blockchain features built-in privacy measures to prevent tracing and conceal ownership and flow of illicit funds?

Options:

A.

Cardano

B.

Polygon

C.

Ethereum

D.

Monero

Question 13

A compliance officer is conducting an AML risk assessment of two different operating models: a centralized cryptoasset exchange and a decentralized cryptoasset exchange. Which key difference causes the compliance officer to risk-rate the decentralized exchange higher than the centralized exchange?

Options:

A.

The cost of each transaction

B.

The number of validator nodes

C.

The lack of a central counterparty

D.

The supported asset types

Question 14

Which are common red flags that indicate fraudulent activity in a decentralized finance marketplace? (Select Two.)

Options:

A.

A non-fungible token is shared privately among a community of supporters via a non-fungible token airdrop; it is not linked to a specific web address to allow for trading.

B.

A coin is launched, has a low social media presence, has many wallet addresses controlling its supply, and has an original white paper published.

C.

A coin is launched using an untested protocol; only a small number of wallets control the supply.

D.

A token is introduced, is endorsed by high-profile celebrities, and the price of the coin steadily rises; there is no significant activity of selling the coin.

E.

A crypto entity is launched, has a bustling social media presence, and offers limited free non-fungible token incentives in exchange for new customer trading.

Question 15

Which term describes converting one cryptoasset into another without first converting to fiat?

Options:

A.

Layering

B.

Chain hopping

C.

Integration

D.

Structuring

Question 16

A firm using blockchain analytics finds an address that sent funds through multiple hops before reaching a darknet market wallet. This is an example of:

Options:

A.

Direct exposure

B.

Indirect exposure

C.

Mixing

D.

Transaction batching

Question 17

What Is the purpose of applying learning(ML)or artificial Intelligence (Al)within a compliance framework? (Select two.)

Options:

A.

To reduce the requirementfor risk assessment

B.

To enhance efficiency

C.

To reduce headcount

D.

To focus skilled resource on higher value activity

Question 18

As per the Financial Action Task Force standards, which activities fall under the definition of a virtual asset service provider? (Select Three.)

Options:

A.

Operation of a virtual assets mining facility

B.

Exchange between one or more forms of virtual assets

C.

Participation in and provision of financial services related to an initial coin offering

D.

Exchange between virtual assets and fiat currencies

E.

Creation of virtual assets software to issue decentralized managed virtual assets

F.

Participation in and provision of financial services related to an initial public offering

Question 19

In sanctions screening, a “fuzzy match” occurs when:

Options:

A.

There is no match found.

B.

A partial or near match to a sanctions list entry occurs.

C.

Only wallet addresses match exactly.

D.

The customer is in a low-risk jurisdiction.

Question 20

To identify and assess the money laundering risks emerging from virtual assets, countries should ensure that virtual asset service providers are: (Select Two.)

Options:

A.

Connected with a regulated financial institution.

B.

Subjected to AML regulations

C.

Maintaining effective monitoring systems.

D.

Located in a jurisdiction with increased regulatory expectations

E.

Evaluated for beneficial ownership of virtual asset clients

Question 21

When enhances international cooperation with regard to law enforcement investigations of virtual asset (VA) crimes?

Options:

A.

Join Financial Action Task Force to access the network of jurisdictions

B.

Establish a new Independent state agency for VAs.

C.

Develop smart contracts for information sharing.

D.

Designate a financial Intelligence unit

Question 22

Misconfigured smart contracts can allow which type of scam to occur?

Options:

A.

Phishing

B.

SIM

C.

Rug pull

D.

Ransomware

Question 23

Which activity should be detected as a red flag during the customer onboarding stage and further investigated?

Options:

A.

Receipt of a law enforcement request to examine transactions on the customer's account

B.

The applicant being located in the same jurisdiction as the virtual asset service provider

C.

The use of a foreign identification document by an immigrant

D.

Sharing of the same IP address by multiple customers

Question 24

A suspicious activity report was filed in the EU for a local company account that held funds generated by the sale of product coupons. A review of the account highlighted a login from an unconnected IP address. Despite repeated requests, the customer failed to provide information on the origins of the funds. Which is the main red flag here?

Options:

A.

Virtual asset service providers outside of the EU are being relied upon.

B.

Funds are generated by the sale of coupons which are connected to a physical product.

C.

There is a failure to cooperate with the source of funds requests.

D.

An IP address is being used that is not previously connected to that customer.

Question 25

In a blockchain 51% attack, what does 51% refer to?

Options:

A.

Governance tokens

B.

Wallets

C.

Computational power required for mining

D.

Exchanges

Question 26

How should an investigator use transaction history to determine whether cryptoassets were previously involved in money laundering?

Options:

A.

Assess the identity of the cryptoasset owner.

B.

Assess other assets held by the cryptoasset owner.

C.

Assess the cryptoasset addresses' receiving exposure to illicit activity.

D.

Assess the jurisdiction where the transactions took place.

Question 27

What is the most pertinent item for a cryptoasset money services business to include in a suspicious activity report?

Options:

A.

All types of cryptocurrencies purchased by the subject, including aggregate total of each and fiat currency equivalent

B.

The names of every owner of the destination wallet address(es) to which the subject sent transactions during the review period

C.

The aggregate total amount of fiat currency used by the subject to purchase cryptocurrency

D.

The subject's account onboarding information not otherwise included in the counter-party information section

Question 28

According to the Financial Action Task Force report, "Virtual Assets Red Flag Indicators", which activity is a red flag related to anonymity?

Options:

A.

Executing multiple high-value transactions after a period of inactivity from the client

B.

Engaging in abnormal transactional activity of virtual assets cashed out at exchanges from peer-to-peer hosted wallets with no logical business explanation

C.

Making frequent transfers in a certain period of time (e.g., a day, a week, a month) to the same virtual asset account with a well-known virtual asset service provider

D.

Conducting Bitcoin-fiat currency exchanges at a potential loss

Question 29

Under the risk-based approach, firms must:

Options:

A.

Apply the same level of due diligence to all customers

B.

Adjust controls based on customer and transaction risk level

C.

Avoid onboarding high-risk customers

D.

Only monitor transactions over USD 10,000

Question 30

Which Is the general consensus among Jurisdictions who have performed a national risk assessment about cryptoasset activities conducted in their countries?

Options:

A.

There Is a rising level of money laundering risks related lo cryptoasset activities

B.

The levelof money laundering risk linked to cryptoasset activities is very dependent on a country's geographical position.

C.

With increased awareness about cryptoasset activities, themoney laundering risk levels becomelower.

D, Where the adoption rate of digital banking Is high, a decreased level of money laundering risks related to cryptoasset activities is reported

Page: 1 / 10
Total 100 questions