Pass the ACAMS AML Certifications CCAS Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which term describes converting one cryptoasset into another without first converting to fiat?

Options:

A.

Layering


B.

Chain hopping


C.

Integration


D.

Structuring


Expert Solution
Questions # 22:

In a blockchain 51% attack, what does 51% refer to?

Options:

A.

Governance tokens


B.

Wallets


C.

Computational power required for mining


D.

Exchanges


Expert Solution
Questions # 23:

Which risk category covers threats from ransomware actors demanding payment in cryptoassets?

Options:

A.

Operational risk


B.

Counterparty risk


C.

Cyber-enabled financial crime risk


D.

Liquidity risk


Expert Solution
Questions # 24:

A customer who runs a cryptoasset automated teller machine (ATM) comes into a financial institution and deposits a larger than usual amount. When asked about the deposit, the customer answers there has been broader adoption of cryptoassets in the region where the ATM is located. Which additional information about the business would indicate high risk for money laundering? (Select Two.)

Options:

A.

The volume and the number of users increase.


B.

The cryptoasset ATM supports a variety of cryptoassets.


C.

The region is neighboring with a narcotic-producing jurisdiction.


D.

The region is located within a high-risk jurisdiction.


E.

The cryptoasset ATM was recently licensed.


Expert Solution
Questions # 25:

What is “layering” in the context of money laundering using cryptoassets?

Options:

A.

Splitting transactions into smaller amounts to evade reporting thresholds


B.

Moving illicit funds through complex transactions to obscure origin


C.

Converting crypto into fiat currency


D.

Freezing illicit accounts


Expert Solution
Questions # 26:

Which of the following would you review as part of standard due diligence? (Select Two.)

Options:

A.

Negative news


B.

Dark web forums


C.

Beneficial ownership


D.

Blockchain exposure


Expert Solution
Questions # 27:

Which of the following are functions of cryptoasset mining? (Select Two.)

Options:

A.

Generating new cryptoassets


B.

Ensuring the security of the network


C.

Optimizing and improving the functionality of the network


D.

Validating transactions on the blockchain


Expert Solution
Questions # 28:

What is a “token burn”?

Options:

A.

Destroying tokens to reduce supply.


B.

Sending tokens to a liquidity pool.


C.

Transferring tokens to an OTC desk.


D.

Locking tokens in staking.


Expert Solution
Questions # 29:

According to the Financial Action Task Force report, "Virtual Assets Red Flag Indicators", which activity is a red flag related to anonymity?

Options:

A.

Executing multiple high-value transactions after a period of inactivity from the client


B.

Engaging in abnormal transactional activity of virtual assets cashed out at exchanges from peer-to-peer hosted wallets with no logical business explanation


C.

Making frequent transfers in a certain period of time (e.g., a day, a week, a month) to the same virtual asset account with a well-known virtual asset service provider


D.

Conducting Bitcoin-fiat currency exchanges at a potential loss


Expert Solution
Questions # 30:

A client at a virtual asset service provider (VASP) opened a wallet four weeks earlier with 201,000 USD. The client received a Bitcoin transfer for a total of 565,400 USD. Which is the strongest indication of an illicit source of funds for the client?

Options:

A.

Two days after opening the wallet, the client transfers 199,000 USD to a third party.


B.

The client declared a total wealth of 600,000 USD at account opening.


C.

It was not possible to trace the client's IP address.


D.

Incoming funds moved through five intermediary wallets before being transferred from a foreign VASP.


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions