Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium ACAMS CCAS Dumps Questions Answers

Page: 1 / 8
Total 100 questions

Certified Cryptoasset Anti-Financial Crime Specialist Examination Questions and Answers

Question 1

What is “hash rate” in blockchain?

Options:

A.

The speed at which wallets are created.

B.

The computational power used for mining.

C.

The transaction fee rate.

D.

The block size limit.

Buy Now
Question 2

Which level of an organization is ultimately responsible for risk oversight?

Options:

A.

1st line compliance team

B.

2nd line compliance team

C.

Chief risk officer

D.

Board of directors

Question 3

What is indirect exposure in regards to blockchain analytics transaction monitoring?

Options:

A.

The cryptoassets are absolutely linked to a specific user and identity on the blockchain.

B.

The cryptoassets have a connection to risky activity via another crypto address or addresses.

C.

The cryptoassets went through a mixing protocol to conceal source of funds.

D.

The fiat currency is not immediately linked to a known bank account.

Question 4

Which is the first action a virtual asset service provider (VASP) should take when it finds out that its customers are engaging in virtual asset (VA) transfers related to unhosted wallets and peer-to-peer (P2P) transactions?

Options:

A.

Allow VA transfers related P2P or unhosted wallets below 1,000 USD or the equivalent amount in local currency, or per defined thresholds in local regulations.

B.

Freeze accounts with records of transactions related to P2P transactions or unhosted wallets.

C.

Collect and assess the data on transactions related to P2P or unhosted wallets to determine if it is within its risk appetite.

D.

Enhance existing risk-based control framework to account for specific risks posed by transactions related to P2P or unhosted wallets.

Question 5

What Is the purpose of applying learning(ML)or artificial Intelligence (Al)within a compliance framework? (Select two.)

Options:

A.

To reduce the requirementfor risk assessment

B.

To enhance efficiency

C.

To reduce headcount

D.

To focus skilled resource on higher value activity

Question 6

What methods do criminals use to avoid clustering of crypto wallet addresses?

Options:

A.

The address receives a large amount of cryptocurrency from another wallet address.

B.

After receiving a large volume of crypto payments in the wallet, they are left there for a long period of time.

C.

The cryptoassets are moved to the exchange after a large number of hops within a short period of time.

D.

A small portion of cryptoassets is moved to an exchange, and the rest remain in the wallet.

Question 7

How should an investigator use transaction history to determine whether cryptoassets were previously involved in money laundering?

Options:

A.

Assess the identity of the cryptoasset owner.

B.

Assess other assets held by the cryptoasset owner.

C.

Assess the cryptoasset addresses' receiving exposure to illicit activity.

D.

Assess the jurisdiction where the transactions took place.

Question 8

Under DIFC AML regulations, enhanced due diligence (EDD) ismandatorywhen:

Options:

A.

A customer is a domestic bank.

B.

The customer is from a high-risk jurisdiction.

C.

The transaction is above USD 1,000.

D.

The customer is a retail investor.

Question 9

A politically exposed person (PEP) opens a crypto account. What is the required action?

Options:

A.

Treat as standard customer.

B.

Apply EDD and senior management approval.

C.

Decline onboarding.

D.

Request a travel rule exemption.

Question 10

What three classifications of assets does the Markets in Crypto-Assets Regulation (commonly known as MICA) apply to? (Select Three.)

Options:

A.

Meme coins

B.

Electronic money tokens

C.

Privacy coins

D.

Cryptoassets

E.

Asset-referenced tokens

Question 11

According to the Financial Action Task Force report, "Virtual Assets Red Flag Indicators", which activity is a red flag related to anonymity?

Options:

A.

Executing multiple high-value transactions after a period of inactivity from the client

B.

Engaging in abnormal transactional activity of virtual assets cashed out at exchanges from peer-to-peer hosted wallets with no logical business explanation

C.

Making frequent transfers in a certain period of time (e.g., a day, a week, a month) to the same virtual asset account with a well-known virtual asset service provider

D.

Conducting Bitcoin-fiat currency exchanges at a potential loss

Question 12

Which is a primary benefit of blockchain transparency for AML compliance?

Options:

A.

Real-time price tracking

B.

Ability to trace historical transactions

C.

Reducing market volatility

D.

Automatic sanctions screening

Question 13

Which blockchain characteristic makes forensic tracing of transactions possible?

Options:

A.

Smart contract automation

B.

Decentralized governance

C.

Immutable public ledger

D.

Sharding

Question 14

An exchange uses blockchain analytics to identify high-risk wallet clusters. This is an example of:

Options:

A.

Transaction screening

B.

KYC

C.

On-chain forensic analysis

D.

Custodial control

Question 15

Which cryptoasset type is most associated with anonymity risk?

Options:

A.

Privacy coin

B.

Stablecoin

C.

Governance token

D.

Security token

Question 16

Which is a type of restricted blockchain?

Options:

A.

Hybrid

B.

Public

C.

Private

D.

Consortium

Question 17

Which blockchain analysis red flag is linked to terrorism financing?

Options:

A.

Microtransactions to donation addresses

B.

Large OTC trades

C.

Proof-of-Stake staking

D.

Smart contract creation

Question 18

As per the Financial Action Task Force standards, which activities fall under the definition of a virtual asset service provider? (Select Three.)

Options:

A.

Operation of a virtual assets mining facility

B.

Exchange between one or more forms of virtual assets

C.

Participation in and provision of financial services related to an initial coin offering

D.

Exchange between virtual assets and fiat currencies

E.

Creation of virtual assets software to issue decentralized managed virtual assets

F.

Participation in and provision of financial services related to an initial public offering

Question 19

In a blockchain 51% attack, what does 51% refer to?

Options:

A.

Governance tokens

B.

Wallets

C.

Computational power required for mining

D.

Exchanges

Question 20

What is the “Travel Rule” under FATF guidance?

Options:

A.

A requirement to record customer addresses for all crypto transfers

B.

A requirement to transmit originator and beneficiary information with crypto transfers above a threshold

C.

A requirement to freeze funds sent across borders

D.

A rule for declaring crypto holdings at customs

Question 21

Which blockchain type is accessible only to a single organization?

Options:

A.

Public

B.

Private

C.

Consortium

D.

Hybrid

Question 22

Which blockchain feature ensures that once a block is added, it cannot be altered without network consensus?

Options:

A.

Consensus algorithm

B.

Hash immutability

C.

Tokenization

D.

Peer-to-peer networking

Question 23

Which features are used by anonymity-enhanced cryptoassets to reduce transparency of transactions and identities? (Select Two.)

Options:

A.

Proof-of-stake mining

B.

Automatic mixing

C.

Secure hashing algorithm 256

D.

Cryptographic enhancements

E.

MetaMask wallet

Question 24

A compliance officer at an exchange who is conducting an annual risk assessment identifies an increased volume of transactions to and from unhosted wallets. Based on Financial Action Task Force guidance, which inherent risk rating would be most appropriate for the compliance officer to assign to such activities?

Options:

A.

Negligible

B.

Low

C.

Moderate

D.

High

Question 25

In considering particular virtual asset products, services, or activities, which features should be considered by management?

Options:

A.

Ability for other virtual asset service providers (VASPs) to utilize the service to provide services to their own customers.

B.

Ability to mingle funds within wider pools.

C.

Regulatory expectations.

D.

Transaction volumes.

Question 26

Which privacy-enhancing feature hides both the sender and receiver in a transaction?

Options:

A.

Ring signatures

B.

Multi-sig

C.

Proof-of-Authority

D.

Token swap

Question 27

Which metric is most relevant for assessing liquidity risk in a cryptoasset exchange?

Options:

A.

Number of listed tokens

B.

Order book depth and spread

C.

Blockchain confirmation times

D.

Wallet address count

Question 28

The Financial Action Task Force recommends countries require virtual asset service providers to maintain all records of transactions and customer due diligence measures for a minimum of:

Options:

A.

6 months

B.

2 years

C.

5 years

D.

7 years

Question 29

Under the risk-based approach, firms must:

Options:

A.

Apply the same level of due diligence to all customers

B.

Adjust controls based on customer and transaction risk level

C.

Avoid onboarding high-risk customers

D.

Only monitor transactions over USD 10,000

Question 30

Misconfigured smart contracts can allow which type of scam to occur?

Options:

A.

Phishing

B.

SIM

C.

Rug pull

D.

Ransomware

Page: 1 / 8
Total 100 questions