New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is the correct risk assessment equation used in AML/CFT compliance frameworks, including for cryptoasset risk evaluations?

A.

Inherent Risk – Control Effectiveness = Residual Risk

B.

Inherent Risk – Residual Risk = Control Effectiveness

C.

Residual Risk + Control Effectiveness = Inherent Risk

D.

Inherent Risk + Control Effectiveness = Residual Risk

Which operational risk mitigation practice by virtual asset service providers (VASPs) is most effective when considering their relationships with other VASPs?

A.

Having no requirement to establish a correspondent relationship and build a risk assessment framework among other cryptoasset exchanges prior to transferring for or on behalf of another person

B.

Developing cross-border correspondent relationships with cryptoasset exchanges in jurisdictions that have weak or non-existent anti-money laundering (AML) regulation or supervision

C.

Assigning all such relationships as high risk and conducting enhanced due diligence on all of them

D.

Gathering sufficient information on the counterpart VASP to determine the quality of the supervision it receives for transactional activities

Which virtual asset relies on an account-based ledger model?

A.

Litecoin

B.

Ethereum

C.

Bitcoin

D.

Monero

What is the purpose of a security audit in reason to smart contracts?

A.

To allow the developer to confirm thatthe code does not violate copyright

B.

To identify any outdated functions or performance issues

C.

To Identify bad actors that ace seeking to misuse the smart contract

D.

To protect investors' funds by identifying weaknesses in the code or protocol

Under FATF guidance, “unhosted wallets” are:

A.

Wallets managed by regulated exchanges.

B.

Wallets where users control private keys directly.

C.

Custodial wallets held by third parties.

D.

Wallets with multi-sig security.

Under the risk-based approach, firms must:

A.

Apply the same level of due diligence to all customers

B.

Adjust controls based on customer and transaction risk level

C.

Avoid onboarding high-risk customers

D.

Only monitor transactions over USD 10,000

Which blockchain feature ensures that once a block is added, it cannot be altered without network consensus?

A.

Consensus algorithm

B.

Hash immutability

C.

Tokenization

D.

Peer-to-peer networking

A suspicious activity report was filed in the EU for a local company account that held funds generated by the sale of product coupons. A review of the account highlighted a login from an unconnected IP address. Despite repeated requests, the customer failed to provide information on the origins of the funds. Which is the main red flag here?

A.

Virtual asset service providers outside of the EU are being relied upon.

B.

Funds are generated by the sale of coupons which are connected to a physical product.

C.

There is a failure to cooperate with the source of funds requests.

D.

An IP address is being used that is not previously connected to that customer.

A virtual asset service provider (VASP) is using public information on the blockchain to trace a wallet address. Which additional step is necessary to identify the owner or controller of that address?

A.

Review the wallet address information periodically.

B.

Acquire information to connect the wallet address to a natural person.

C.

Screen the wallet address for any historical transaction activity.

D.

Obtain further information connecting wallet address to virtual asset transactions.

What methods do criminals use to avoid clustering of crypto wallet addresses?

A.

The address receives a large amount of cryptocurrency from another wallet address.

B.

After receiving a large volume of crypto payments in the wallet, they are left there for a long period of time.

C.

The cryptoassets are moved to the exchange after a large number of hops within a short period of time.

D.

A small portion of cryptoassets is moved to an exchange, and the rest remain in the wallet.