How does law enforcement use Suspicious Activity Reports (SARs)? (Select Two.)
An exchange uses blockchain analytics to identify high-risk wallet clusters. This is an example of:
Which cryptoasset type is most associated with anonymity risk?
Under the risk-based approach, firms must:
What is indirect exposure in regards to blockchain analytics transaction monitoring?
Under FATF guidelines, VASPs must file a Suspicious Transaction Report (STR) when:
Which statement describes what a staff member should do If suspicious activity is identified?
How should an investigator use transaction history to determine whether cryptoassets were previously involved in money laundering?
Which of the following would you review as part of standard due diligence? (Select Two.)
What is a “smart contract”?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
ACAMS Free Exams |
---|
![]() |