Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ACAMS Advanced-CAMS-Audit - Advanced CAMS-Audit Certification Exam

Page: 2 / 3
Total 90 questions

What model test verifies that alerts indicative of potentially suspicious activity are not missed due to threshold settings?

A.

Black-box configuration

B.

Above-the-line

C.

Gap analysis

D.

Below-the-line

During the interview, the local director informs the audit manager that no internal or regulatory audits have occurred since the local director's appointment The local director relies on a locally-approved independent external review of Company A performed 12 months ago by a local firm How should the audit manager respond?

A.

Validate the accuracy of content of the independent external review report by recommending an audit and assess if the findings of both the independent review and audit are similar.

B.

Review the independent external review report to determine the extent to which reliance can be placed on it and identify matters requiring further review by internal audit.

C.

Rely upon the independent external review report as the base to formulate conclusions of the current onsite visit by internal audit.

D.

Advise the group board that the group should set aside the external review reports as the use of the third party independent reviewer was not authorized at group board level.

Which factors should be taken into consideration in designing a follow-up strategy when remedial action needs to be taken due to deficiencies identified in an AML audit?

A.

Available resources and board of directors' commitment

B.

Responsible action owner and internal audit commitment to follow up

C.

Reporting the breach and the regulatory response

D.

Target completion date and status update on remedial action

When evaluating an AML training program tor CFT functions the auditor should verify that:

A.

interns and third parties are not included.

B.

attendees have completed post-course surveys.

C.

ethics training has been delivered to senior management.

D.

tailored training has been provided to AML and CFT staff.

Findings from a financial institution's (Fl's) regulatory examination suggest that several unidentified risks pose a serious threat. The Fl identifies the risks and implements a set of controls to mitigate those risks. Which type of risk considers the controls' effectiveness?

A.

Aggregate

B.

Consolidated

C.

Inherent

D.

Residual

As an auditor reviewing this investigation report, which indicates an effective process?

A.

The compliance officer concluded the investigation approximately 3 months later and filed a suspicious activity report.

B.

The compliance officer concluded from the report that there are reasonable grounds for suspicion and filed a suspicious activity report.

C.

The compliance officer filed a suspicious activity report and omitted details regarding the reason it was filed.

D.

The compliance officer decided not to cease the Business relationship hut kept the account under rigorous monitoring process.

What type of audit approach should the auditor use when testing KYC files as part of an AML examination?

A.

Horizontal

B.

Full scope

C.

Vertical

D.

Risk-based

During a sample review, the auditor notices that an alert was generated for a large deposit that was inconsistent with the customer profile. The customer has had no other incidents in the past 10 years and has provided documents to confirm the deposit as a property sale. What should the auditor do?

A.

Increase the sample size.

B.

Document the conclusion within the audit work papers.

C.

Carry out further investigation of this alert.

D.

Consult with the compliance officer.

When assessing the KYC process which should an auditor observe from the customer risk assessment? (Select Two)

A.

Self-declaration or Beneficial ownership should not be accepted as it is not adequate.

B.

Overseas shareholders not involved in the customer's dally operations are not beneficial owners.

C.

The purpose and intended nature of the business relationship were not reviewed m the assessment.

D.

The ultimate beneficial owners of the customer need to be Identified and verified.

E.

If this was a face-to-face customer, the overall customer risk rating should be changed to low.

Which should be incorporated into an AML compliance policy? (Select Three.)

A.

Documentation record keeping

B.

Suspicious activity reporting

C.

Cryptocurrency threat assessment

D.

Financial results reporting

E.

Mandatory training requirements

F.

Credit risk assessment