ACAMS CAMS - Certified Anti-Money Laundering Specialist (CAMS7 the 7th edition)
An AML compliance officer for a large bank has recently received an internal audit report on the private banking unit. The report revealed that the unit staff were not following risk-based due diligence procedures, so that the unit was not operating effectively.
Which immediate actions should the AML compliance officer consider to address these findings? (Select Two.)
Management Should implement a quality assurance program in the private banking unit
The role of FATF-style regional bodies (FSRBs) is to; (Select Three.)
Which of the following are part of a risk-based approach? (Select Three.)
Which of the following is a critical consideration for private sector firms when sharing data and intelligence to combat financial crime?
A law firm is involved in setting up complex offshore corporate structures for a client with minimal documentation of the source of funds. The firm does not question the client’s transactions or report any suspicious activity.
What is the primary money laundering risk associated with this behavior by the law firm?
In the process of mutual evaluations and subsequent follow-ups used by the Financial Action Task Force (FATF) to assess the quality of various jurisdictions' AML controls, the FATF:
Financial institutions (FIs) must use a risk-based approach in customer due diligence (CDD) measures for legal entity clients by:
A committee should have a clear and precise definition of its mandate to ensure effective function and governance, set out in a document often referred to as the Terms of Reference (ToR).
Which key features are generally included in the Terms of Reference? (Select Three.)
An AML compliance officer receives an independent audit report with a number of findings.
An appropriate response to the report would include:
A customer of a financial Institution (Fl) complained that they had received multiple emails appearing to originate from the Fl urging them to click on a link or open a remittance attachment for confirmation. After opening the attachment, the customer later realized that funds had been systematically transferred out of their bank account without their knowledge
Which type of cybercrime is described in this scenario?
