New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following can be considered a reliable, independent source document, data, or information?

A.

Information provided by a prospective customer

B.

Photocopy of a copy of a government-issued identity document

C.

Information obtained from an open-source database

D.

Information obtained directly from a government-managed registry

A key advantage of privacy enhancing technologies (PETs) in anti-money laundering is that they offer:

A.

simultaneous encryption and decryption for underlying data.

B.

full access to underlying data with full and uninterrupted calculations made on the data.

C.

secure processing of data while it remains encrypted.

D.

transfer, decryption and storage of data by the data processor.

Which of the following is a broader risk specific to casinos and gambling?

A.

Low thresholds for transactions

B.

Frequent use of cash

C.

Cross-border transactions

D.

Weak KYC policies and procedures

Which section of the USA PATRIOT Act permits the US government to seize funds deposited in a US correspondent account of a foreign bank, creating extraterritorial impact?

A.

Section 314(a)

B.

Section 314(b)

C.

Section 319(b)

D.

Section 319(a)

According to the Egmont Group, which benefits do public-private partnerships (PPPs) provide to Financial Intelligence Units (FIUs)? (Select Three.)

A.

Helping overcome data protection and information sharing limitations

B.

Enhancing the quality of reporting and additional informational input

C.

Helping to alleviate the financial cost burden on law enforcement

D.

Helping to design common approaches and identify desired deliverables

E.

Offering flexibility, agility, and opportunities to adjust to the ML/TF threat environment

An employee at a financial institution (Fl) suspects that one of their co-workers is involved in a financial investment scam syndicate. Which step should be taken next by the employee who has the suspicion?

A.

Question their co-worker to determine If their suspicions are correct before reporting to the Fl's Human Resources department

B.

Use the Fl's whistle blowing channel to report the suspected employee

C.

Warn colleagues and customers of the F1 that the employee's suspicious financial investment proposals could be a scam

D.

Conduct an open-source intelligence investigation using artificial intelligence tools to gain more information on the activities of the suspected employee

E.

Report the suspected employee to the line manager of the F1 to take the required action

Ateam overseeing the governance and effectiveness of a bank’s transaction monitoring approachshould implement which strategies? (Select Two.)

A.

Periodic review of suspicious activity reports (SARs) filed with FinCEN to determine whether any should be withdrawn.

B.

Periodic and ad hoc cooperation with the legal team to appropriately investigate and monitor the transactions of subjects of subpoenas or government inquiries.

C.

Periodic review of client profiles to ensure that the most up-to-date information is on file for high-risk clients in line with the bank’s internal policies and procedures.

D.

Periodic review of the transaction monitoring scenarios and their productivity to ensure that appropriate AML typologies are reflected.

During a routine periodic KYC refresh of a policyholder and client of an insurance company, updated business registry documentation has highlighted that the policyholder's business has changed addresses five times during the last year and that the ultimate beneficial owner (UBO) changed two weeks ago.

What actions should be taken immediately?

A.

Investigate the changes of address and change of UBO and in the meantime decline payment and withdrawal instructions from the policy until completion of the investigation and next steps are agreed upon

B.

Request the relationship manager set up a meeting with the policyholder to update their address and submit details of the new UBO in the name of good customer service

C.

Investigate the changes of address and change of UBO and in the meantime freeze the client's policy

D.

File a suspicious transaction report because the insurance company was not made aware of the business' change of UBO

Which of the following businesses require enhanced or additional scenarios for identifying anomalous transactions? (Select Two.)

A.

Companies operating in cash intense businesses not subject to licensing requirement

B.

Companies operating hospitals and health-care services

C.

Companies operating in cash intense businesses subject to licensing requirement

D.

Companies producing pharmaceutical products and medical devices, companies active in the mining industry

E.

Companies operating retail shops countrywide

A legal instrument executed between two nations that governs cross-border information sharing is known as a:

A.

Memorandum of Agreement.

B.

Declaration of Understanding.

C.

Memorandum of Understanding.

D.

Mutual Legal Assistance Treaty.

E.

Request for Urgent Information.