Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

ACAMS CCAS Dumps

Page: 1 / 10
Total 100 questions

Certified Cryptoasset Anti-Financial Crime Specialist Examination Questions and Answers

Question 1

Which statement regarding cryptocurrencies, digital assets, and blockchain is correct?

Options:

A.

Cryptocurrencies use encryption techniques operating independently from a central bank.

B.

Cryptocurrencies and blockchain are the same and are terms used interchangeably.

C.

Digital assets can only operate on a blockchain.

D.

Cryptocurrencies, blockchain, and digital assets can all be used as a means of payment.

Question 2

Under FATF guidance, “unhosted wallets” are:

Options:

A.

Wallets managed by regulated exchanges.

B.

Wallets where users control private keys directly.

C.

Custodial wallets held by third parties.

D.

Wallets with multi-sig security.

Question 3

What is the most pertinent item for a cryptoasset money services business to include in a suspicious activity report?

Options:

A.

All types of cryptocurrencies purchased by the subject, including aggregate total of each and fiat currency equivalent

B.

The names of every owner of the destination wallet address(es) to which the subject sent transactions during the review period

C.

The aggregate total amount of fiat currency used by the subject to purchase cryptocurrency

D.

The subject's account onboarding information not otherwise included in the counter-party information section

Question 4

What methods do criminals use to avoid clustering of crypto wallet addresses?

Options:

A.

The address receives a large amount of cryptocurrency from another wallet address.

B.

After receiving a large volume of crypto payments in the wallet, they are left there for a long period of time.

C.

The cryptoassets are moved to the exchange after a large number of hops within a short period of time.

D.

A small portion of cryptoassets is moved to an exchange, and the rest remain in the wallet.

Question 5

According to me Financial Action Task Force's (FATF's> definition of virtualasset service provider (VASP), for which activityis an entity required to be licensee or registered as a VASP in the jurisdiction(s) where they are created?

Options:

A.

Cryptocurrencymining operations

B.

Safekeepingand/or administration of virtual assets and exchange between one or more forms of virtual assets

C.

Operating blockchainnodes

D.

Virtual money servicebusinesses

Question 6

What is the “Travel Rule” under FATF guidance?

Options:

A.

A requirement to record customer addresses for all crypto transfers

B.

A requirement to transmit originator and beneficiary information with crypto transfers above a threshold

C.

A requirement to freeze funds sent across borders

D.

A rule for declaring crypto holdings at customs

Question 7

Which level of an organization is ultimately responsible for risk oversight?

Options:

A.

1st line compliance team

B.

2nd line compliance team

C.

Chief risk officer

D.

Board of directors

Question 8

Which is a primary benefit of blockchain transparency for AML compliance?

Options:

A.

Real-time price tracking

B.

Ability to trace historical transactions

C.

Reducing market volatility

D.

Automatic sanctions screening

Question 9

Which FATF Recommendation specifically addresses virtual assets and VASPs?

Options:

A.

R.12

B.

R.15

C.

R.20

D.

R.22

Question 10

A compliance officer at an exchange who is conducting an annual risk assessment identifies an increased volume of transactions to and from unhosted wallets. Based on Financial Action Task Force guidance, which inherent risk rating would be most appropriate for the compliance officer to assign to such activities?

Options:

A.

Negligible

B.

Low

C.

Moderate

D.

High

Question 11

An exchange uses blockchain analytics to identify high-risk wallet clusters. This is an example of:

Options:

A.

Transaction screening

B.

KYC

C.

On-chain forensic analysis

D.

Custodial control

Question 12

Which virtual asset relies on an account-based ledger model?

Options:

A.

Litecoin

B.

Ethereum

C.

Bitcoin

D.

Monero

Question 13

A firm using blockchain analytics finds an address that sent funds through multiple hops before reaching a darknet market wallet. This is an example of:

Options:

A.

Direct exposure

B.

Indirect exposure

C.

Mixing

D.

Transaction batching

Question 14

Why should firms monitor “dusting” attacks?

Options:

A.

They slow blockchain performance.

B.

They can link anonymous wallets to known identities.

C.

They increase transaction fees.

D.

They inflate token supply.

Question 15

Which of the following would you review as part of standard due diligence? (Select Two.)

Options:

A.

Negative news

B.

Dark web forums

C.

Beneficial ownership

D.

Blockchain exposure

Question 16

Which is an example of “structuring” in crypto transactions?

Options:

A.

Sending multiple sub-threshold transactions to avoid reporting.

B.

Exchanging one crypto for another.

C.

Using a decentralized exchange.

D.

Engaging in staking.

Question 17

A compliance officer is conducting a customer risk review. Which statements represent the highest level of customer risk? (Select Two.)

Options:

A.

A customer who uses a virtual private network (VPN) connection to access the customer's account

B.

A student customer depositing 15,000 USD over a period of a month, using the funds to purchase cryptoassets that are sent to another virtual asset service provider

C.

A business customer opting to pay suppliers in cryptoassets

D.

A customer receiving cryptoassets daily from another virtual asset service provider located in a foreign jurisdiction which are then sent to a private wallet

E.

A customer located in a foreign country donating 10,000 USD worth of cryptoassets to a charity for veterans in the US

Question 18

Which are essential components of an AML program for Customer Due Diligence (CDD)? (Select Three.)

Options:

A.

Requirement for training of staff responsible for gathering CDD information

B.

Requirement to keep all information necessary to maintain a customer's risk profile

C.

Requirement to maintain an accurate and complete list of virtual assets exposed to high risk of misuse

D.

Procedures to annually review all clients

E.

Procedures to ensure that high-risk customers' IP addresses are subject to ongoing monitoring

F.

Procedures to address circumstances where the true identity of a customer is questionable

Question 19

What is the correct risk assessment equation used in AML/CFT compliance frameworks, including for cryptoasset risk evaluations?

Options:

A.

Inherent Risk – Control Effectiveness = Residual Risk

B.

Inherent Risk – Residual Risk = Control Effectiveness

C.

Residual Risk + Control Effectiveness = Inherent Risk

D.

Inherent Risk + Control Effectiveness = Residual Risk

Question 20

What three classifications of assets does the Markets in Crypto-Assets Regulation (commonly known as MICA) apply to? (Select Three.)

Options:

A.

Meme coins

B.

Electronic money tokens

C.

Privacy coins

D.

Cryptoassets

E.

Asset-referenced tokens

Question 21

Which risk category best reflects the risks associated with payment methods (e.g., cash, wires, credit cards, virtual assets)?

Options:

A.

Geographical

B.

Customers

C.

New technologies

D.

Products and services

Question 22

A suspicious activity report was filed in the EU for a local company account that held funds generated by the sale of product coupons. A review of the account highlighted a login from an unconnected IP address. Despite repeated requests, the customer failed to provide information on the origins of the funds. Which is the main red flag here?

Options:

A.

Virtual asset service providers outside of the EU are being relied upon.

B.

Funds are generated by the sale of coupons which are connected to a physical product.

C.

There is a failure to cooperate with the source of funds requests.

D.

An IP address is being used that is not previously connected to that customer.

Question 23

Which cryptoasset type is most associated with anonymity risk?

Options:

A.

Privacy coin

B.

Stablecoin

C.

Governance token

D.

Security token

Question 24

The lightning network is apayment protocol built on top of the Bitcoin blockchainthat:

Options:

A.

allows usersto send large payments to decentralised exchanges

B.

allows the bridging of assets from one blockchain to another.

C.

allows users to take advantage of no transaction fees.

D.

allows users to conduct transactions off-chain

Question 25

A client at a virtual asset service provider (VASP) opened a wallet four weeks earlier with 201,000 USD. The client received a Bitcoin transfer for a total of 565,400 USD. Which is the strongest indication of an illicit source of funds for the client?

Options:

A.

Two days after opening the wallet, the client transfers 199,000 USD to a third party.

B.

The client declared a total wealth of 600,000 USD at account opening.

C.

It was not possible to trace the client's IP address.

D.

Incoming funds moved through five intermediary wallets before being transferred from a foreign VASP.

Question 26

What is the intention of the Financial Action Task Force's (FATF's) Travel Rule?

Options:

A.

To enhance customer due diligence (CDD) procedures to ensure high quality data

B.

To slow down cryptoasset transactions to allow law enforcement to intervene

C.

To mitigate money laundering and terrorist financing (ML/TF) risk by increasing the ability to follow funds via different financial institutions

Question 27

Which activity is most commonly associated with mixing and tumbling as a method of laundering cryptoassets?

Options:

A.

Presence of unknown or disguised source of funds

B.

Rapid purchase and sale of different cryptocurrencies

C.

Use of IP address concealing software

D.

Frequent transactions to high-risk jurisdictions via different virtual asset service providers

Question 28

Which are common red flags that indicate fraudulent activity in a decentralized finance marketplace? (Select Two.)

Options:

A.

A non-fungible token is shared privately among a community of supporters via a non-fungible token airdrop; it is not linked to a specific web address to allow for trading.

B.

A coin is launched, has a low social media presence, has many wallet addresses controlling its supply, and has an original white paper published.

C.

A coin is launched using an untested protocol; only a small number of wallets control the supply.

D.

A token is introduced, is endorsed by high-profile celebrities, and the price of the coin steadily rises; there is no significant activity of selling the coin.

E.

A crypto entity is launched, has a bustling social media presence, and offers limited free non-fungible token incentives in exchange for new customer trading.

Question 29

A customer who runs a cryptoasset automated teller machine (ATM) comes into a financial institution and deposits a larger than usual amount. When asked about the deposit, the customer answers there has been broader adoption of cryptoassets in the region where the ATM is located. Which additional information about the business would indicate high risk for money laundering? (Select Two.)

Options:

A.

The volume and the number of users increase.

B.

The cryptoasset ATM supports a variety of cryptoassets.

C.

The region is neighboring with a narcotic-producing jurisdiction.

D.

The region is located within a high-risk jurisdiction.

E.

The cryptoasset ATM was recently licensed.

Question 30

A customer sends funds to multiple newly created wallets before cashing out via an exchange. This is an example of:

Options:

A.

Structuring

B.

Chain hopping

C.

Layering

D.

Dusting

Page: 1 / 10
Total 100 questions