Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ACAMS CAMS - Certified Anti-Money Laundering Specialist (CAMS7 the 7th edition)

Page: 9 / 12
Total 395 questions

An AML compliance officer for a large bank has recently received an internal audit report on the private banking unit. The report revealed that the unit staff were not following risk-based due diligence procedures, so that the unit was not operating effectively.

Which immediate actions should the AML compliance officer consider to address these findings? (Select Two.)

Management Should implement a quality assurance program in the private banking unit

A.

Private bankers should receive training on AML procedures.

B.

All employees should receive refresher AML training.

C.

The board should review and approve a revised AML policy to change customer due diligence requirements in private banking.

D.

The legal department should conduct a review to assess potential legal consequences.

The role of FATF-style regional bodies (FSRBs) is to; (Select Three.)

A.

identify and address the current financial crime trends through the issuance of typologies originating in members outside of their FSRB's Jurisdiction.

B.

provide AM L/C FT technical assistance needed by members in their FSRB junsdiction.

C.

coordinate technical assistance for members in their FSRB jurisdiction

D.

set and amend the FATF 40 Recommendations for members in their FSRB jurisdiction.

E.

identify and address any gaps in the AML/CFT policies for members outside of their FSRB jurisdiction.

F.

offer mutual evaluation and follow-up processes for members in their FSRB Jurisdiction.

Which of the following are part of a risk-based approach? (Select Three.)

A.

Determining detailed risk profiles for customers based on their activities and relationships

B.

Focusing monitoring primarily on previously flagged customers while using standard controls for others

C.

Choosing and applying effective controls that align with the identified risk levels

D.

Performing a comprehensive risk assessment to identify customer, transaction, and geographic risks

E.

Allocating resources equally across all customer segments to ensure fairness

Which of the following is a critical consideration for private sector firms when sharing data and intelligence to combat financial crime?

A.

The preference of upper management regarding which teams should participate in the data-sharing initiative

B.

The cost of the data-sharing system and whether it its within the existing IT budget

C.

The potential return on investment (ROI) from the data shared versus the financial crime prevention effort

D.

Ensuring that the shared data complies with applicable data protection regulations while maintaining the integrity and accuracy of the information

A law firm is involved in setting up complex offshore corporate structures for a client with minimal documentation of the source of funds. The firm does not question the client’s transactions or report any suspicious activity.

What is the primary money laundering risk associated with this behavior by the law firm?

A.

The law firm is avoiding fees by minimizing documentation for clients in high-risk jurisdictions

B.

The law firm is engaging in aggressive tax planning to help the client avoid legal taxes

C.

The law firm is providing routine legal services that include creating complex legal structures, and no further scrutiny is required

D.

The law firm is acting as a gatekeeper, facilitating the movement and concealment of illicit funds through complex corporate structures

In the process of mutual evaluations and subsequent follow-ups used by the Financial Action Task Force (FATF) to assess the quality of various jurisdictions' AML controls, the FATF:

A.

imposes economic sanctions on jurisdictions with lax AML controls to force them to strengthen their controls.

B.

conducts on-site inspections of financial institutions in jurisdictions with lax AML controls to identify deficiencies and recommend improvements.

C.

publishes annual reports ranking all member jurisdictions based on their self-assessment of AML controls.

D.

conducts a peer review process whereby member countries assess the AML controls of other jurisdictions and provide recommendations for improvement.

Financial institutions (FIs) must use a risk-based approach in customer due diligence (CDD) measures for legal entity clients by:

A.

Understanding and obtaining information about the competition the business relationship could face

B.

Identifying a customer’s identity using data and information from the internet and social media

C.

Taking reasonable measures to verify the identity of the beneficial owner

D.

Conducting ongoing analysis of the business relationship’s profitability

A committee should have a clear and precise definition of its mandate to ensure effective function and governance, set out in a document often referred to as the Terms of Reference (ToR).

Which key features are generally included in the Terms of Reference? (Select Three.)

A.

Organization chart of the attendees

B.

Extent of power and decision-making abilities

C.

Company culture and values

D.

Composition and structure

E.

Delegation of authority

An AML compliance officer receives an independent audit report with a number of findings.

An appropriate response to the report would include:

A.

Drafting detailed action plans for the audit team to execute to close the findings

B.

Reperforming the testing for the controls mentioned in the findings to confirm the results of the audit

C.

Defining remedial actions based on the findings' root cause analysis

D.

Assigning responsibility for reviewing the action plan to the board of directors

A customer of a financial Institution (Fl) complained that they had received multiple emails appearing to originate from the Fl urging them to click on a link or open a remittance attachment for confirmation. After opening the attachment, the customer later realized that funds had been systematically transferred out of their bank account without their knowledge

Which type of cybercrime is described in this scenario?

A.

Vishing

B.

Pharming

C.

SMSishing

D.

Spear phishing