Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Premium Access
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
A financial institution must develop AML/CTF risk ratings (typically high, medium or low) for each country in which its customers conduct business. Risk ratings are decided by the financial institution and documented in detail, with reference to the guidance from which source?
Correct
Incorrect
The source of reference for financial institutions in making their risk ratings is from The OFAC, The European Union, HM Treasury, United Nations Security Council, CIA Factbook, FATF 40 Recommendations and the Mutual Evaluation reports, Transparency International and The Wolfsberg Group, Country Risk Frequently Asked Questions.
-
Question 2 of 30
2. Question
In November 2019, FinCen published the jurisdictions that are subject to the FATF’s call for countermeasures and/or EDD due to their strategic AML/CFT deficiencies, North Korea and Iran. What did Fincen publish during this month?
Correct
Incorrect
In November 2019 FinCen published “Advisory on the Financial Action Task Force-Identified Jurisdictions with Anti-Money Laundering and Combating the Financing of Terrorism Deficiencies and Relevant Actions by the United States Government.”
-
Question 3 of 30
3. Question
The cycle of terrorist financing is usually linear and the amounts are much smaller compared to money laundering. Which of these statements revolve around the funding cycle of terrorists?
Correct
Incorrect
Funding cycle revolves around raise, store, move, use.
-
Question 4 of 30
4. Question
There are three basic levels of a terrorist organization, all statements apply to the three basic levels, except?
Correct
Incorrect
The three basic levels of terrorist organization are, first, headquarters, where the core organization has a defined leadership structure, regional franchises of the core organization have leadership structures which may or may not be directly aligned with the core organization and the grassroots operatives, likely inspired by, or led by, the regional franchises or the core organization.
-
Question 5 of 30
5. Question
Once a financial institution suspects that it has identified a case of potential terrorist financing it is considered a best practice to notify law enforcement immediately after filing the suspicious transaction report. Which of the following is a correct funding flow?
Correct
Incorrect
Examples of correct funding flows are from the point of origin to a terrorist organization, from the organization to a specific operation, and to the individual operative.
-
Question 6 of 30
6. Question
In the Risk Assessment Program, it is fundamental that an AML/CTF and sanctions screening program has effectiveness, what does sanctions screening program do to achieve this effectiveness?
Correct
Incorrect
The effectiveness of an AML/CTF and sanctions screening program is based on data integrity. Following its elements, such as accuracy, completeness, timeliness and authorized.
-
Question 7 of 30
7. Question
It is annually recommended to update the risk process assessment, however, there is the best time to do this. When it is particularly updated?
Correct
Incorrect
It is annually recommended to update the risk process assessment, but it is best when a merger or an acquisition is being considered and all the products of the combined financial institution have a consistent risk rating, a new financial product or service is being launched and lastly, an existing product or service is being launched in a new jurisdiction.
-
Question 8 of 30
8. Question
In the Risk Assessment Program, there are countries included in the FATF improving the global AML/CTF compliance process, which of the following countries are these?
Correct
Incorrect
“The countries included in FATF improving global AML/CFT compliance process are Bahamas, Botswana, Cambodia, Ghana, Pakistan, Panama, Syria, Trinidad and Tobago, and Yemen.”
-
Question 9 of 30
9. Question
Inherent Risk Factors have three types, high, medium and, low. Which of the statements is NOT a low inherent risk?
Correct
Incorrect
The Low Inherent Risks is no exposure to high-risk jurisdictions, normal retail domestic products such as checking and savings accounts, stable domestic customer base without significant growth and face to face contact at account opening for new customers.
-
Question 10 of 30
10. Question
There is a necessity to have projects remediate controls that are less than effective, and an explanation as to the root cause for a trend that is decreasing and the action that is being taken to rectify it. The question is, which of the following is the proper control technique documentation?
Correct
Incorrect
The control technique documentation is as follows, being improving, stable, or decreasing with the supporting evidence.
-
Question 11 of 30
11. Question
In making risk assessment document ratings are used at the enterprise and the front line unit levels for customers, products, countries and delivery channels for the current and previous years. What are the colors used for these ratings?
Correct
Incorrect
The risk assessment document will contain the red, amber and green (RAG) ratings at the enterprise and the front line unit levels for customers, products, countries and delivery channels for the current and previous years
-
Question 12 of 30
12. Question
A risk assessment document should have a good commentary statement, which of the following below is not applicable for the said document?
Correct
Incorrect
The following statements shall be included as a commentary in risk assessment documents: reasons supporting each of the risk ratings; the direction of the residual risk; changes in the control environment since the previous risk assessment; and changes in the risk assessment methodology.
-
Question 13 of 30
13. Question
To identify and prevent the funding of terrorism is a major responsibility for financial institutions and it is extremely difficult to achieve. What are the characteristics of terrorist funding?
Correct
Incorrect
Terrorist funding has the following characteristics, funding requirements, funding sources, and funding mechanisms.
-
Question 14 of 30
14. Question
What does the Wolfsberg Anti-Bribery and Corruption (ABC) Compliance Programme Guidance indicate about bribery?
Correct
Incorrect
Wolfsberg Anti-Bribery and Corruption (ABC) Compliance Programme Guidance indicate bribery as:
“…involving the offer, promise, request, acceptance or transfer of anything of value either directly or indirectly to or by an individual, in order to improperly induce, influence, or reward the performance of a function or an activity.” -
Question 15 of 30
15. Question
In data integrity, what is the process significant to the accuracy of the data submitted for transaction monitoring and sanctions screening?
Correct
Incorrect
In Data Integrity , the process which is extremely significant to the accuracy of the data submitted for transaction monitoring and sanctions screening is referred to as “data mapping”.
-
Question 16 of 30
16. Question
In October 2015 the “FATF REPORT Emerging Terrorist Financing Risks” was published and discussed key concepts, which of these are true?
Correct
Incorrect
FATF REPORT Emerging Terrorist Financing Risks was published in October 2015 and it discusses the following key concepts: threat, vulnerability and consequence.
-
Question 17 of 30
17. Question
Which of these statements is not a recommended guideline for Anti-Bribery and Corruption (ABC) program?
Correct
Incorrect
Some of the elements for Anti-Bribery and Corruption (ABC) program are governance, firm-wide policy, a controlled environment, and customer-related corruption risks
-
Question 18 of 30
18. Question
The risk governance framework for a financial institution and each of the committees must ensure that the policy which covers their responsibility must remain current and relevant. Which high-level summary policy holds the major components of the AML/CTF compliance program?
Correct
Incorrect
It is the Global AML/CTF Policy that should be a high-level summary defining all the major components of the AML/CTF compliance program.
-
Question 19 of 30
19. Question
The Global AML/CTF Policy should be a high-level summary policy which defines all major components of the AML/CTF compliance program, what are these components?
Correct
Incorrect
The major components of the AML/CTF compliance program are risk assessment, transaction monitoring, suspicious activity reporting, currency transaction reporting, independent testing, training, and sanctions.
-
Question 20 of 30
20. Question
What process is effective in helping a financial institution identify any potential vulnerability and reducing its risk down to an acceptable level of AML/CTF residual risk?
Correct
Incorrect
The process that is effective in helping a financial institution identify any potential vulnerability and reducing its risk down to an acceptable level of AML/CTF residual risk is by effectively monitoring customer transaction data.
-
Question 21 of 30
21. Question
Transaction monitoring is recognized as a critical step towards reducing a financial institution’s inherent risk down to an acceptable level of AML/CTF residual risk. What is its main purpose or effectivity?
Correct
Incorrect
Its purpose is to process the transaction data of the customers in order to identify patterns of financial activity that are either potentially suspicious, because they may be indicative of a predicate crime, or unusual in the context of that customer.
-
Question 22 of 30
22. Question
In transaction monitoring, there is the term “typologies”, what does it mean?
Correct
Incorrect
The term typologies refer to the individual sections of program code in the transaction monitoring application that executes against the transaction data of the customers of the financial institution.
-
Question 23 of 30
23. Question
Typology has thresholds, how do you confirm its period of validity?
Correct
Incorrect
In confirming the validity of the typology thresholds and reduce the volume of false-positive alerts, the testing has to establish that the number of false negatives is not significant.
-
Question 24 of 30
24. Question
What approach is used in validating the typology thresholds?
Correct
Incorrect
The approach is called as testing Below The Line (BTL).
-
Question 25 of 30
25. Question
What does transacion monitoring operations focuses on?
Correct
Incorrect
It focuses on the monitoring of customer transactions and interactions, which include but are not limited to: deposits, transfers, and withdrawals of money.
-
Question 26 of 30
26. Question
Transaction monitoring operations comprise a committee, policy and procedures, department and data management. What does a transaction monitoring committee do?
Correct
Incorrect
The committee is responsible for managing the global standards and guidelines for the transaction monitoring component of the AML/CTF Compliance program of the financial institution. It ensures that the transaction monitoring program is globally consistent, effective and sustainable as it regards typology, maintenance and tuning.
-
Question 27 of 30
27. Question
Typologies have a threshold, what term do you use in establishing the appropriate threshold values?
Correct
Incorrect
The terms used are false positive and false negatives.
-
Question 28 of 30
28. Question
The appropriate threshold values for transaction monitoring are false-positive and false-negative, what is false-negative?
Correct
Incorrect
The false-negative threshold value are alerts that are not generated, but perhaps should have been because they are likely to be indicative of potentially suspicious activity. It may occur because the thresholds are too high.
-
Question 29 of 30
29. Question
Who of these people uses their knowledge, research and analysis of past history in order to recommend a threshold that captures the majority of relevant alerts while attempting to minimize the number of false positives to be investigated?
Correct
Incorrect
The Quantitative analysts use their knowledge, research and analysis of past history in order to recommend a threshold that captures the majority of relevant alerts while attempting to minimize the number of false positives to be investigated.
-
Question 30 of 30
30. Question
What happens to typologies that are consistently unproductive?
Correct
Incorrect
The typologies are considered for decommissioning.