Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

ACAMS CCAS Certified Cryptoasset Anti-Financial Crime Specialist Examination Exam Practice Test

Demo: 30 questions
Total 100 questions

Certified Cryptoasset Anti-Financial Crime Specialist Examination Questions and Answers

Question 1

Which level of an organization is ultimately responsible for risk oversight?

Options:

A.

1st line compliance team

B.

2nd line compliance team

C.

Chief risk officer

D.

Board of directors

Question 2

Which is an accurate description of a Decentralized Autonomous Organization (DAO)?

Options:

A.

DAOs are decentralized blockchain organizations that require managerial activity by humans.

B.

DAOs are organizational structures through which how a protocol will operate is determined by a group of actors.

C.

DAOs are cryptocurrency funds in which the board of directors submit their votes using blockchain technology.

D.

DAOs are decentralized blockchain technologies that use traditional contracts instead of smart contracts.

Question 3

How should an investigator use transaction history to determine whether cryptoassets were previously involved in money laundering?

Options:

A.

Assess the identity of the cryptoasset owner.

B.

Assess other assets held by the cryptoasset owner.

C.

Assess the cryptoasset addresses' receiving exposure to illicit activity.

D.

Assess the jurisdiction where the transactions took place.

Question 4

Which cryptoasset type is most associated with anonymity risk?

Options:

A.

Privacy coin

B.

Stablecoin

C.

Governance token

D.

Security token

Question 5

Which are essential components of an AML program for Customer Due Diligence (CDD)? (Select Three.)

Options:

A.

Requirement for training of staff responsible for gathering CDD information

B.

Requirement to keep all information necessary to maintain a customer's risk profile

C.

Requirement to maintain an accurate and complete list of virtual assets exposed to high risk of misuse

D.

Procedures to annually review all clients

E.

Procedures to ensure that high-risk customers' IP addresses are subject to ongoing monitoring

F.

Procedures to address circumstances where the true identity of a customer is questionable

Question 6

In cryptoasset AML programs, “ongoing monitoring” means:

Options:

A.

Checking customer activity only when onboarding

B.

Continuous review of transactions to detect anomalies

C.

Only screening customers for sanctions once

D.

Freezing all suspicious accounts

Question 7

When enhances international cooperation with regard to law enforcement investigations of virtual asset (VA) crimes?

Options:

A.

Join Financial Action Task Force to access the network of jurisdictions

B.

Establish a new Independent state agency for VAs.

C.

Develop smart contracts for information sharing.

D.

Designate a financial Intelligence unit

Question 8

Which is the first action a virtual asset service provider (VASP) should take when it finds out that its customers are engaging in virtual asset (VA) transfers related to unhosted wallets and peer-to-peer (P2P) transactions?

Options:

A.

Allow VA transfers related P2P or unhosted wallets below 1,000 USD or the equivalent amount in local currency, or per defined thresholds in local regulations.

B.

Freeze accounts with records of transactions related to P2P transactions or unhosted wallets.

C.

Collect and assess the data on transactions related to P2P or unhosted wallets to determine if it is within its risk appetite.

D.

Enhance existing risk-based control framework to account for specific risks posed by transactions related to P2P or unhosted wallets.

Question 9

What is the correct risk assessment equation used in AML/CFT compliance frameworks, including for cryptoasset risk evaluations?

Options:

A.

Inherent Risk – Control Effectiveness = Residual Risk

B.

Inherent Risk – Residual Risk = Control Effectiveness

C.

Residual Risk + Control Effectiveness = Inherent Risk

D.

Inherent Risk + Control Effectiveness = Residual Risk

Question 10

In considering particular virtual asset products, services, or activities, which features should be considered by management?

Options:

A.

Ability for other virtual asset service providers (VASPs) to utilize the service to provide services to their own customers.

B.

Ability to mingle funds within wider pools.

C.

Regulatory expectations.

D.

Transaction volumes.

Question 11

Based on Financial Action Task Force guidance, when a cryptoasset exchange carries out an occasional transaction, the exchange is required to conduct CDD when the transaction is above:

Options:

A.

USD/EUR 1000.

B.

USD/EUR 5000.

C.

USD/EUR 10000.

D.

USD/EUR 15000.

Question 12

Which key type of information allows financial intelligence units to combat the risk of anonymity in virtual currencies?

Options:

A.

The data referring to the timing of the transaction

B.

The data reconciling the transaction and the identity of the receiver

C.

The data connecting the transaction information to the virtual address

D.

The data associating the virtual address to the identity of the owner

Question 13

The Financial Action Task Force recommends countries require virtual asset service providers to maintain all records of transactions and customer due diligence measures for a minimum of:

Options:

A.

6 months

B.

2 years

C.

5 years

D.

7 years

Question 14

What methods do criminals use to avoid clustering of crypto wallet addresses?

Options:

A.

The address receives a large amount of cryptocurrency from another wallet address.

B.

After receiving a large volume of crypto payments in the wallet, they are left there for a long period of time.

C.

The cryptoassets are moved to the exchange after a large number of hops within a short period of time.

D.

A small portion of cryptoassets is moved to an exchange, and the rest remain in the wallet.

Question 15

An exchange uses blockchain analytics to identify high-risk wallet clusters. This is an example of:

Options:

A.

Transaction screening

B.

KYC

C.

On-chain forensic analysis

D.

Custodial control

Question 16

Which key differences between the Bitcoin and Ethereum blockchains must investigators consider when investigating flows of funds on each respective chain? (Select Two.)

Options:

A.

Transaction cost

B.

Variety of applications, assets, and networks

C.

Address length

D.

Ledger model

Question 17

What is the “Travel Rule” under FATF guidance?

Options:

A.

A requirement to record customer addresses for all crypto transfers

B.

A requirement to transmit originator and beneficiary information with crypto transfers above a threshold

C.

A requirement to freeze funds sent across borders

D.

A rule for declaring crypto holdings at customs

Question 18

In a blockchain 51% attack, what does 51% refer to?

Options:

A.

Governance tokens

B.

Wallets

C.

Computational power required for mining

D.

Exchanges

Question 19

A suspicious activity report was filed in the EU for a local company account that held funds generated by the sale of product coupons. A review of the account highlighted a login from an unconnected IP address. Despite repeated requests, the customer failed to provide information on the origins of the funds. Which is the main red flag here?

Options:

A.

Virtual asset service providers outside of the EU are being relied upon.

B.

Funds are generated by the sale of coupons which are connected to a physical product.

C.

There is a failure to cooperate with the source of funds requests.

D.

An IP address is being used that is not previously connected to that customer.

Question 20

Which type of blockchain is jointly operated by multiple pre-approved organizations?

Options:

A.

Public

B.

Consortium

C.

Private

D.

Hybrid

Question 21

Which is the most important consideration when assessing compromise risks when creating a decentralized finance protocol or smart contract?

Options:

A.

Security token standard

B.

Dual authentication protocols

C.

Government regulation

D.

Code uniqueness

Question 22

What three classifications of assets does the Markets in Crypto-Assets Regulation (commonly known as MICA) apply to? (Select Three.)

Options:

A.

Meme coins

B.

Electronic money tokens

C.

Privacy coins

D.

Cryptoassets

E.

Asset-referenced tokens

Question 23

Which first step should a VASP take upon detecting repeated transactions to a high-risk wallet?

Options:

A.

Immediately freeze the account.

B.

Conduct internal investigation and enhanced due diligence.

C.

Publicly disclose the wallet.

D.

Notify all customers.

Question 24

In cryptoasset compliance, “integration” refers to:

Options:

A.

Converting illicit crypto into fiat or legitimate assets.

B.

Mixing crypto to hide origins.

C.

Transferring crypto between wallets.

D.

Staking assets to earn rewards.

Question 25

A virtual asset service provider (VASP) is using public information on the blockchain to trace a wallet address. Which additional step is necessary to identify the owner or controller of that address?

Options:

A.

Review the wallet address information periodically.

B.

Acquire information to connect the wallet address to a natural person.

C.

Screen the wallet address for any historical transaction activity.

D.

Obtain further information connecting wallet address to virtual asset transactions.

Question 26

Which is a core component of customer due diligence (CDD)?

Options:

A.

Transaction batching

B.

Identity verification

C.

Token staking

D.

Node validation

Question 27

Which advantage ofthe proofof work consensus algorithm is widely applicable in many cryptocurrencies and other blockchainsystems?

Options:

A.

Dependency on electricity

B.

Centralization of the consensus mechanism

C.

Verification of transactions by solving complex mathematical puzzles

D.

Security of small networks

Question 28

What is a “token burn”?

Options:

A.

Destroying tokens to reduce supply.

B.

Sending tokens to a liquidity pool.

C.

Transferring tokens to an OTC desk.

D.

Locking tokens in staking.

Question 29

A compliance officer is conducting an AML risk assessment of two different operating models: a centralized cryptoasset exchange and a decentralized cryptoasset exchange. Which key difference causes the compliance officer to risk-rate the decentralized exchange higher than the centralized exchange?

Options:

A.

The cost of each transaction

B.

The number of validator nodes

C.

The lack of a central counterparty

D.

The supported asset types

Question 30

Which blockchain features built-in privacy measures to prevent tracing and conceal ownership and flow of illicit funds?

Options:

A.

Cardano

B.

Polygon

C.

Ethereum

D.

Monero

Demo: 30 questions
Total 100 questions