ACAMS CAMS Übungsprüfungen
Zuletzt aktualisiert am 10.05.2025- Prüfungscode: CAMS
- Prüfungsname: Certified Anti-Money Laundering Specialist
- Zertifizierungsanbieter: ACAMS
- Zuletzt aktualisiert am: 10.05.2025
A law enforcement agent is conducting an investigation into a possible money laundering event.
During the investigation, the officer will use:
- A . a risk-based approach alert generating system.
- B . the follow the money approach.
- C . confirmed evidence obtained from financial intelligence units.
- D . a process to identify suspicious activity.
Which should be provided to the board of directors or designated specialized committee when preparing suspicious activity reports (SARs)?
- A . All possible details of SARs filed during the reported period
- B . Names of all customers subject to SARs filed during the reported period
- C . Statistical data regarding SARs filed during the reported period
- D . Copies of all SARs filed during the reported period
What three attributes do havens for money laundering and terrorist financing typically have? Choose 3 answers
- A . Limited types of institutions and persons covered by money laundering laws and regulations
- B . Little enforcement of the laws, weak penalties or provisions that make it difficult to confiscate or freeze assets related to money laundering
- C . A large number of predicate crimes for money laundering
- D . Absence of an effective FIU
The most important anti-money laundering issue associated with on-line banking is accurately
- A . Capturing data
- B . Analyzing data
- C . Identifying clients
- D . Generating reports
The most important anti-money laundering issue associated with on-line banking is accurately
- A . Capturing data
- B . Analyzing data
- C . Identifying clients
- D . Generating reports
According to experts, what is the most effective way to prevent money laundering through financial institutions?
- A . Ensuring that transaction monitoring systems can identify terrorist financing
- B . Collecting information on beneficial owners and foreign customers
- C . Instituting a policy prohibiting the acceptance of funds intended for terrorist financing
- D . Implementing a sound customer due diligence program
A bank in the Netherlands has been requested to share information about a series of transactions and related customers with a bank in Italy. Both banks are subject to European Union jurisdiction.
Which factor is the most important to consider before the Dutch bank shares the requested information with the Italian bank?
- A . The Dutch bank’s legal obligations to protect customer privacy and bank secrecy prohibit it from sharing any such information.
- B . The Dutch bank should require a production order from the Italian bank and receive approval from
its legal department before sharing the requested information. - C . The need to fight financial crime outweighs the EU’s data protection and privacy regulations.
- D . The Dutch bank should limit any information sharing to what is necessary, reasonable, and proportionate, in line with applicable laws and regulations.
Which element is generally required of all anti-money laundering programs?
- A . A computer-based suspicious activity monitoring system
- B . A qualified compliance officer to manage the program
- C . Annual in-person AML training for all employees
- D . An enhanced due diligence program for all new customers
How does the Financial Action Task Force (FAT F) measure the effectiveness of a country’s efforts to combat money laundering and terrorist financing?
- A . Mutual evaluation
- B . FATF Evaluation Committee
- C . Basel Committee
- D . Series of internal audits followed by reporting to FATF
When using virtual assets such as Bitcoin to finance terrorism, which tactic may be used to ensure that the virtual assets are not easily seized by law enforcement?
- A . Using self-hosted wallets to create many different donation addresses that are updated continuously
- B . Posting donation addresses that are linked to accounts at centralized virtual asset service providers
- C . Using the same donation address across multiple donation campaigns and media types
- D . Forming relationships with virtual asset service providers that have strong KYC processes in place to avoid suspicion