A financial institution is conducting an enterprise-wide risk assessment (EWRA) and has identified a high inherent risk of money laundering associated with its private banking division due to the clientele’s high net worth and complex financial structures. However, the institution has implemented robust customer due diligence (CDD) and enhanced due diligence (EDD) procedures, along with sophisticated transaction monitoring systems.
How would these controls impact the assessment of residual risk?
A multinational corporation is considering expanding into a new market with a history of political instability and corruption.
Which strategy would be most effective in mitigating reputational risk from a financial crime perspective associated with such an expansion?
A customer of a financial Institution (Fl) complained that they had received multiple emails appearing to originate from the Fl urging them to click on a link or open a remittance attachment for confirmation. After opening the attachment, the customer later realized that funds had been systematically transferred out of their bank account without their knowledge
Which type of cybercrime is described in this scenario?
Which statement regarding data privacy is the most accurate in the context of AML investigations?
Which strategies are most effective for prioritizing resources within an anti-financial crime (AFC) program using a risk-based approach (RBA)? (Choose two.)
How can public-private partnerships (PPPs) foster collaboration in the fight against financial crime? (Choose two.)
Which practices should financial institutions (FIs) adopt for the process of terminating customer relationships? (Choose three.)
Which of the following corporate structures present a higher money laundering risk because of reduced transparency? (Select Three.)
Professions such as lawyers, accountants, and trust and company service providers (TCSPs) are sometimes referred to as "gatekeepers" because they:
A wealthy individual is using a complex corporate structure to facilitate illegal logging and then illegal mining of the resulting resources from that land.
Which category of predicate crime is taking place?