Which level of an organization is ultimately responsible for risk oversight?
Which is an accurate description of a Decentralized Autonomous Organization (DAO)?
How should an investigator use transaction history to determine whether cryptoassets were previously involved in money laundering?
Which cryptoasset type is most associated with anonymity risk?
Which are essential components of an AML program for Customer Due Diligence (CDD)? (Select Three.)
In cryptoasset AML programs, “ongoing monitoring” means:
When enhances international cooperation with regard to law enforcement investigations of virtual asset (VA) crimes?
Which is the first action a virtual asset service provider (VASP) should take when it finds out that its customers are engaging in virtual asset (VA) transfers related to unhosted wallets and peer-to-peer (P2P) transactions?
What is the correct risk assessment equation used in AML/CFT compliance frameworks, including for cryptoasset risk evaluations?
In considering particular virtual asset products, services, or activities, which features should be considered by management?
Based on Financial Action Task Force guidance, when a cryptoasset exchange carries out an occasional transaction, the exchange is required to conduct CDD when the transaction is above:
Which key type of information allows financial intelligence units to combat the risk of anonymity in virtual currencies?
The Financial Action Task Force recommends countries require virtual asset service providers to maintain all records of transactions and customer due diligence measures for a minimum of:
What methods do criminals use to avoid clustering of crypto wallet addresses?
An exchange uses blockchain analytics to identify high-risk wallet clusters. This is an example of:
Which key differences between the Bitcoin and Ethereum blockchains must investigators consider when investigating flows of funds on each respective chain? (Select Two.)
What is the “Travel Rule” under FATF guidance?
In a blockchain 51% attack, what does 51% refer to?
A suspicious activity report was filed in the EU for a local company account that held funds generated by the sale of product coupons. A review of the account highlighted a login from an unconnected IP address. Despite repeated requests, the customer failed to provide information on the origins of the funds. Which is the main red flag here?
Which type of blockchain is jointly operated by multiple pre-approved organizations?
Which is the most important consideration when assessing compromise risks when creating a decentralized finance protocol or smart contract?
What three classifications of assets does the Markets in Crypto-Assets Regulation (commonly known as MICA) apply to? (Select Three.)
Which first step should a VASP take upon detecting repeated transactions to a high-risk wallet?
In cryptoasset compliance, “integration” refers to:
A virtual asset service provider (VASP) is using public information on the blockchain to trace a wallet address. Which additional step is necessary to identify the owner or controller of that address?
Which is a core component of customer due diligence (CDD)?
Which advantage ofthe proofof work consensus algorithm is widely applicable in many cryptocurrencies and other blockchainsystems?
What is a “token burn”?
A compliance officer is conducting an AML risk assessment of two different operating models: a centralized cryptoasset exchange and a decentralized cryptoasset exchange. Which key difference causes the compliance officer to risk-rate the decentralized exchange higher than the centralized exchange?
Which blockchain features built-in privacy measures to prevent tracing and conceal ownership and flow of illicit funds?