New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ACAMS CCAS - Certified Cryptoasset Anti-Financial Crime Specialist Examination

Page: 3 / 3
Total 100 questions

Which advantage ofthe proofof work consensus algorithm is widely applicable in many cryptocurrencies and other blockchainsystems?

A.

Dependency on electricity

B.

Centralization of the consensus mechanism

C.

Verification of transactions by solving complex mathematical puzzles

D.

Security of small networks

What is the purpose of a security audit in reason to smart contracts?

A.

To allow the developer to confirm thatthe code does not violate copyright

B.

To identify any outdated functions or performance issues

C.

To Identify bad actors that ace seeking to misuse the smart contract

D.

To protect investors' funds by identifying weaknesses in the code or protocol

Which FATF Recommendation specifically addresses virtual assets and VASPs?

A.

R.12

B.

R.15

C.

R.20

D.

R.22

Which of the following would you review as part of standard due diligence? (Select Two.)

A.

Negative news

B.

Dark web forums

C.

Beneficial ownership

D.

Blockchain exposure

Which risk category best reflects the risks associated with payment methods (e.g., cash, wires, credit cards, virtual assets)?

A.

Geographical

B.

Customers

C.

New technologies

D.

Products and services

Which is the most important consideration when assessing compromise risks when creating a decentralized finance protocol or smart contract?

A.

Security token standard

B.

Dual authentication protocols

C.

Government regulation

D.

Code uniqueness

Which blockchain feature ensures that once a block is added, it cannot be altered without network consensus?

A.

Consensus algorithm

B.

Hash immutability

C.

Tokenization

D.

Peer-to-peer networking

Which are essential components of an AML program for Customer Due Diligence (CDD)? (Select Three.)

A.

Requirement for training of staff responsible for gathering CDD information

B.

Requirement to keep all information necessary to maintain a customer's risk profile

C.

Requirement to maintain an accurate and complete list of virtual assets exposed to high risk of misuse

D.

Procedures to annually review all clients

E.

Procedures to ensure that high-risk customers' IP addresses are subject to ongoing monitoring

F.

Procedures to address circumstances where the true identity of a customer is questionable

A firm using blockchain analytics finds an address that sent funds through multiple hops before reaching a darknet market wallet. This is an example of:

A.

Direct exposure

B.

Indirect exposure

C.

Mixing

D.

Transaction batching

If a VASP suspects a transaction involves a sanctioned entity, it must:

A.

Report only if over USD 10,000

B.

File a SAR and freeze assets if required by law

C.

Wait for law enforcement confirmation

D.

Cancel the customer account immediately without reporting