What should the compliance officer do?
The branch manager calls the compliance officer and informs her that a law enforcement officer has just left the branch and was asking a lot of questions and left a business card. What should the compliance officer do?A . File a suspicious transaction reportB . Follow up to verify that...
Which type of scenario is helpful in mitigating this weakness?
An organization’s automated surveillance system identifies large fluctuations in customer activity. As a result of an audit, the compliance officer is informed that the system is not generating alerts when activity is consistently abnormal over a long period of time. Currently the organization is evaluating new alert scenarios in an...
In which two ways does a government Financial Intelligence Unit interact with public and private sectors? (Choose two.)
In which two ways does a government Financial Intelligence Unit interact with public and private sectors? (Choose two.)A . It governs the methods of investigation used by competent authoritiesB . It mediates disputes between financial institutions and investigative authoritiesC . It receives and analyzes disclosures filed by financial and non-bank...
Which red flag should stop the agent from discussing this potential purchase further?
A U.K. real estate agent has three foreign clients interested in purchasing an apartment building, valued at £30 million, in the outskirts of London as an investment property. The clients are not willing to have their names provided to the bank. The clients want the purchase to be made in...
Which insurance product is particularly vulnerable to money laundering?
Which insurance product is particularly vulnerable to money laundering?A . AnnuityB . CasualtyC . CollateralD . Regulated pensionView AnswerAnswer: A
What are two requirements with respect to supporting documentation that is used to identify potentially suspicious activity, according to Financial Action Task Force? (Choose two.)
What are two requirements with respect to supporting documentation that is used to identify potentially suspicious activity, according to Financial Action Task Force? (Choose two.)A . It must be retained for at least five yearsB . It must be retained for at least seven yearsC . It must be kept...
To whom should the investigator escalate these concerns?
Upon a routine account review a money laundering investigator identified a number of large round dollar wire transfer deposits into a business account owned by a local auto repair shop. The wire transfers all originated from a country that is a known financial secrecy haven with poor anti-money laundering controls....
Which two factors should increase the risk of a correspondent bank customer and require additional due diligence according to the Wolfsberg Anti-Money Laundering Principles for Correspondent Banking? (Choose two.)
Which two factors should increase the risk of a correspondent bank customer and require additional due diligence according to the Wolfsberg Anti-Money Laundering Principles for Correspondent Banking? (Choose two.)A . The customer is located in a Financial Action Task Force member country and provides services primarily to a local individual...
What do Financial Action Task Force (FATF)-style regional bodies do for their members to help combat money laundering and terrorist financing?
What do Financial Action Task Force (FATF)-style regional bodies do for their members to help combat money laundering and terrorist financing?A . They provide technical assistance to members in implementing FATF recommendationsB . They assist member countries in penalizing entities that violate FATF standards and recommendationsC . They work with...
Which three present the highest anti-money laundering or sanctions risk and will require controls prior to launch?
An institution is about to release a new peer to peer (P2P) funds transfer product to provide much needed remittance services to an under-banked population segment in the country. The service allows customers to transfer funds through a mobile banking application to individuals worldwide entering only a name and mobile...