What is the correct risk assessment equation used in AML/CFT compliance frameworks, including for cryptoasset risk evaluations?
A compliance officer Is assigned a group of customers. Which action should the officer fake to determinethe appropriate level of customer due diligence apply to each customer?
Under DIFC AML regulations, enhanced due diligence (EDD) ismandatorywhen:
Why should firms monitor “dusting” attacks?
What is the intention of the Financial Action Task Force's (FATF's) Travel Rule?
Which governance function is ultimately responsible for approving AML/CFT policies?
Which level of an organization is ultimately responsible for risk oversight?
Which blockchain type is accessible only to a single organization?
Which type of cryptoasset is explicitly designed to maintain a stable value?
Which features are used by anonymity-enhanced cryptoassets to reduce transparency of transactions and identities? (Select Two.)
What is the “Travel Rule” under FATF guidance?
Which blockchain features built-in privacy measures to prevent tracing and conceal ownership and flow of illicit funds?
A compliance officer is conducting an AML risk assessment of two different operating models: a centralized cryptoasset exchange and a decentralized cryptoasset exchange. Which key difference causes the compliance officer to risk-rate the decentralized exchange higher than the centralized exchange?
Which are common red flags that indicate fraudulent activity in a decentralized finance marketplace? (Select Two.)
Which term describes converting one cryptoasset into another without first converting to fiat?
A firm using blockchain analytics finds an address that sent funds through multiple hops before reaching a darknet market wallet. This is an example of:
What Is the purpose of applying learning(ML)or artificial Intelligence (Al)within a compliance framework? (Select two.)
As per the Financial Action Task Force standards, which activities fall under the definition of a virtual asset service provider? (Select Three.)
In sanctions screening, a “fuzzy match” occurs when:
To identify and assess the money laundering risks emerging from virtual assets, countries should ensure that virtual asset service providers are: (Select Two.)
When enhances international cooperation with regard to law enforcement investigations of virtual asset (VA) crimes?
Misconfigured smart contracts can allow which type of scam to occur?
Which activity should be detected as a red flag during the customer onboarding stage and further investigated?
A suspicious activity report was filed in the EU for a local company account that held funds generated by the sale of product coupons. A review of the account highlighted a login from an unconnected IP address. Despite repeated requests, the customer failed to provide information on the origins of the funds. Which is the main red flag here?
In a blockchain 51% attack, what does 51% refer to?
How should an investigator use transaction history to determine whether cryptoassets were previously involved in money laundering?
What is the most pertinent item for a cryptoasset money services business to include in a suspicious activity report?
According to the Financial Action Task Force report, "Virtual Assets Red Flag Indicators", which activity is a red flag related to anonymity?
Under the risk-based approach, firms must:
Which Is the general consensus among Jurisdictions who have performed a national risk assessment about cryptoasset activities conducted in their countries?