Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Based on studies executed by the Organization for Economic Cooperation and Development (OECD), which occupations are particularly vulnerable to the use of false identities and identity theft?

A.

Government officers

B.

Sea port officers

C.

Lawyers

D.

Laborers

What should afinancial institution (FI) doin response to aformal law enforcement requestto produce documents?

A.

Verify the officer’s identification and ask for the law enforcement request to be served when theChief Executive Officeris available to sign for it.

B.

Ask for an extension to review the FI’sprivacy policyandconfidentiality policybefore providing any information under the law enforcement request.

C.

Designate a person responsible for theinternal investigationin preparation of documents for the request.

D.

Keepsenior management informedat all times to strategically organize a defense toterminate the law enforcement request.

Can trading in antiques be useful for money laundering?

A.

No, because the antiques market is rather small and unusual transactions would draw at-tention.

B.

No, because antique sales and purchases are highly regulated worldwide.

C.

Yes, because cash is often physically hidden within the antiques themselves.

D.

Yes, because antiques can be of high value and often easily transported.

A senior government official is trying to open an account in a financial institution (FI) that operates in a different country from where the official is domiciled. The official is using an asset manager intermediary to represent them. According to the Wolfsberg Group, which next steps should the FI take regarding the opening of the account? (Select Three.)

A.

Report to authorities that a possible suspicious activity is being undertaken by a politically exposed person.

B.

Screen for applicable sanctions only for the official in the name of the person for whom the account will be opened.

C.

Reasonably establish if the source of wealth and funds of the official is legitimate.

D.

Perform due diligence procedures on the managing intermediary.

E.

Determine whether the intermediary representative is acting on the officer's behalf.

F.

Ensure the official's client file is updated so that the information is maintained in a consistent and complete manner.

According to PinCEN. when a financial institution (PI) identities a suspicious activity that necessitates suspicious activity report (SAR) filing, the SAR supporting documentation should (Select Two.)

A.

include all documents or records that assisted the Fl in making the determination that the activity required a filing.

B.

always be limited to account name, account details, and transaction records.

C.

have written policies and procedures to maintain supporting documentation.

D.

be saved in a single separate file with hard copies stored in a fireproof cabinet.

A recent anti-money laundering audit revealed several regulatory reporting violations and lapses with the

organization’s anti-money laundering policy. As a result, the compliance officer has created a follow-up matrix

to document progress in correcting the identified deficiencies.

To whom should the compliance officer provide regular updates of corrective action to help ensure the

appropriate oversight?

A.

Audit management

B.

Human Resources

C.

Business line managers

D.

Designated board committee

What must be materially true regarding transactions for United States (U.S.) sanctions laws to have

jurisdiction?

A.

Transactions are traced to illegal proceeds

B.

Transactions are processed by a U.S. person

C.

Transactions are stripped of beneficial owner information

D.

Transactions are identified as proceeds of foreign corruption

According to the USA PATRIOT Act, under which condition would US financial institutions (Fls) maintain correspondent accounts for foreign shell banks?

A.

US Fls cannot maintain correspondent bank accounts for foreign shell banks.

B.

US Fls can open correspondent bank accounts for foreign shell banks but only in certain countries.

C.

US Fls must undertake a rigorous, risk-based approval process to open correspondent bank accounts for foreign shell banks.

D.

US Fls must be certified by the Financial Action Task Force to maintain correspondent accounts for foreign shell banks.

Which three are the most commonly used risk criteria?

A.

Country Risk

B.

Customer Risk

C.

Reputation Risk

D.

Product and Service Risk

Which action does the Financial Action Task Force call on member countries to take in the most serious cases when countries have significant strategic AML deficiencies?

A.

Contribute to mutual evaluations

B.

Apply countermeasures

C.

Eliminate all financial dealings

D.

Report high-risk transactions

AnAML/CFT unit often compiles information about customer activity and product usagethat might be of interest toother parts of the organization.

Before allowing the unit to communicate such information internally, the organization mustreview:

A.

Applicable data privacy lawsin relevant jurisdictions and the organization’s data security and privacy policies for any limitations.

B.

Enterprise-wide risk assessmentsand the employee handbook for any limitations on sharing commercially sensitive customer data.

C.

Therisk rating of the customersto avoid sharing data relating to higher-risk customers.

D.

The organization’sAML compliance policiesto ensure that customer data can be easily shared internally and internationally.

What is therelationship between the EU Anti-Money Laundering Directives (AMLDs) and local AML regulationsin European Union (EU) member states? (Select Two.)

A.

Local AML laws and regulationsoverridethe requirements of the EU AMLD.

B.

Local AML regulations may imposeadditional or more stringentrequirements than the EU AMLD.

C.

The EU AMLD provides aframework that member countries must implementthrough local AML regulations.

D.

The EU AMLD and local AML regulations areseparate and unrelated legal frameworks.

E.

The EU AMLD and local AML regulationsmust have identical requirements.

Which action should countries take related to the financing of terrorist acts in accordance with the Financial

Action Task Force 40 Recommendations?

A.

Oppose

B.

Sanction

C.

Prosecute

D.

Criminalize

Which statement regardingdata privacy in AML investigationsis the most accurate?

A.

Financial Intelligence Units (FIUs) should document purposes for which personal data included on Suspicious Activity Reports (SARs) may be shared with other agencies.

B.

Any customer that is the subject of a suspicious report filing has the right to request redaction of their personal data.

C.

Data privacy laws prohibit information sharing between financial institutions for the purposes of AML investigations in all jurisdictions.

D.

Organizations are required to demonstrate that customers have opted into information sharing before submitting SARs to relevant Financial Intelligence Units (FIUs).

Which of the following are considered best practices for effective AML/CFT training programs? (Select Three.)

A.

Training should cover practical examples, use case studies, and provide information on how to comply with policies.

B.

Up-to-date records including logs of training and completion dates should be maintained.

C.

Training should be broad, high level, and not role-specific in order to reach the largest audience.

D.

Training should cover the consequences of not complying with policies and procedures.

E.

Training should always be provided by an independent third party.

Which is an indicator that there is an attempt to conceal a company's true beneficial ownership?

A.

The company has a subsidiary in another jurisdiction, and the beneficial ownership of the subsidiary includes a local investor in that jurisdiction.

B.

Recent changes to the company's ownership structure have been documented internally and are reflected in documents filed with local authorities.

C.

Beneficial ownership information from the time that the company was formed several years ago does not match the current beneficial ownership information.

D.

The person filling out an application on the company's behalf indicates that a beneficial owner is a nominee for another person not named in the company's documentation.

Separating illicit proceeds from their source by a series of complex financial Transactions designed to disguise the audit trail and provide anonymity is an example of what?

A.

placement

B.

structuring

C.

layering

D.

integration

A financial crimes risk appetite statement describes:

A.

how an organization defines Its risk-based approach.

B.

how an organization determines its key risk and performance indicators.

C.

the level and type of risk the organization is willing to take to meet its objectives

D.

the purpose of an organization's financial crimes compliance program.

Whichchanges at a financial institution (FI)should trigger anenterprise-wide reassessmentof itsinherent AML risk exposure? (Select Three.)

A.

Introduction of new products or services.

B.

Restructuring of the FI’s risk and compliance functions.

C.

Changes in the individuals overseeing the FI's product lines and sales strategies.

D.

Use of new technologies for delivering existing products.

E.

Mergers or acquisitions.

Which three procedures should a compliance officer looking to revise an institution’s CTF efforts include in accordance with the Wolfsberg Group’s Statement on the Suppression of the Financing of Terrorism?

A.

Consulting applicable lists and taking appropriate actions to determine if customers appear on such lists

B.

Reporting matches from lists of known or suspected terrorists to relevant authorities

C.

Maintaining customer information to facilitate timely retrieval of such information

D.

Reviewing only original identification documents when verifying customers