Which of the following is a common strategy employed by non-governmental organizations (NGOs) to combat money laundering?
An internal audit team is reviewing the anti-financial crime (AFC) program of its firm.
Which of the following attributes of the third line of defense would be most critical to ensure unbiased and effective oversight?
The financial industry relies heavily on rules-based approaches to transaction monitoring to detect suspicious activities.
Scenario-based systems use technology and algorithms to identify: (Choose three.)
When a multinational organization develops its anti-financial crime (AFC) program, what is the most important consideration for ensuring compliance across different jurisdictions?
Having a risk-based approach is central to a financial institution understanding the money laundering and terrorist financing risk to which they are exposed. The development of a money laundering and terrorist financing risk assessment is a key starting point.
Commonly used risk factors include. (Select Three.)
In a standard customer due diligence (CDD) process focused on financial inclusion, the Financial Action Task Force (FATF) Recommendations require: (Choose two.)
An employee at a financial institution (FI) suspects that one of their co-workers is involved in a financial investment scam syndicate.
Which step should be taken next by the employee who has the suspicion?
When the Financial Action Task Force (FATF) places a jurisdiction on the list of "jurisdictions under increased monitoring," also known as the "grey list," the jurisdiction:
Which scenario best justifies why a customer's account might be closed by a financial institution?
The law enforcement agency (LEA) of a foreign jurisdiction contacts a financial institution (FI) regarding one of the FI's clients. The LEA advises that the client is currently wanted for prosecution as a result of a series of human trafficking charges.
What should the FI do? (Select Two.)