Certified Cryptoasset Anti-Financial Crime Specialist Examination Questions and Answers
Which statement regarding cryptocurrencies, digital assets, and blockchain is correct?
Under FATF guidance, “unhosted wallets” are:
What is the most pertinent item for a cryptoasset money services business to include in a suspicious activity report?
What methods do criminals use to avoid clustering of crypto wallet addresses?
According to me Financial Action Task Force's (FATF's> definition of virtualasset service provider (VASP), for which activityis an entity required to be licensee or registered as a VASP in the jurisdiction(s) where they are created?
What is the “Travel Rule” under FATF guidance?
Which level of an organization is ultimately responsible for risk oversight?
Which is a primary benefit of blockchain transparency for AML compliance?
Which FATF Recommendation specifically addresses virtual assets and VASPs?
A compliance officer at an exchange who is conducting an annual risk assessment identifies an increased volume of transactions to and from unhosted wallets. Based on Financial Action Task Force guidance, which inherent risk rating would be most appropriate for the compliance officer to assign to such activities?
An exchange uses blockchain analytics to identify high-risk wallet clusters. This is an example of:
Which virtual asset relies on an account-based ledger model?
A firm using blockchain analytics finds an address that sent funds through multiple hops before reaching a darknet market wallet. This is an example of:
Why should firms monitor “dusting” attacks?
Which of the following would you review as part of standard due diligence? (Select Two.)
Which is an example of “structuring” in crypto transactions?
A compliance officer is conducting a customer risk review. Which statements represent the highest level of customer risk? (Select Two.)
Which are essential components of an AML program for Customer Due Diligence (CDD)? (Select Three.)
What is the correct risk assessment equation used in AML/CFT compliance frameworks, including for cryptoasset risk evaluations?
What three classifications of assets does the Markets in Crypto-Assets Regulation (commonly known as MICA) apply to? (Select Three.)
Which risk category best reflects the risks associated with payment methods (e.g., cash, wires, credit cards, virtual assets)?
A suspicious activity report was filed in the EU for a local company account that held funds generated by the sale of product coupons. A review of the account highlighted a login from an unconnected IP address. Despite repeated requests, the customer failed to provide information on the origins of the funds. Which is the main red flag here?
Which cryptoasset type is most associated with anonymity risk?
The lightning network is apayment protocol built on top of the Bitcoin blockchainthat:
A client at a virtual asset service provider (VASP) opened a wallet four weeks earlier with 201,000 USD. The client received a Bitcoin transfer for a total of 565,400 USD. Which is the strongest indication of an illicit source of funds for the client?
What is the intention of the Financial Action Task Force's (FATF's) Travel Rule?
Which activity is most commonly associated with mixing and tumbling as a method of laundering cryptoassets?
Which are common red flags that indicate fraudulent activity in a decentralized finance marketplace? (Select Two.)
A customer who runs a cryptoasset automated teller machine (ATM) comes into a financial institution and deposits a larger than usual amount. When asked about the deposit, the customer answers there has been broader adoption of cryptoassets in the region where the ATM is located. Which additional information about the business would indicate high risk for money laundering? (Select Two.)
A customer sends funds to multiple newly created wallets before cashing out via an exchange. This is an example of: