Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > ACAMS > AML Certifications > Advanced-CAMS-Audit

Advanced-CAMS-Audit Advanced CAMS-Audit Certification Exam Question and Answers

Question # 4

The auditor reviews the AML compliance program and after a walk-through, determines that AML-related reports to the board could be useful to test the governance and management oversight. The AML reports vary in content and complexity. Which sampling method should the auditor select?

A.

Risk-based

B.

Judgmental

C.

Statistical

D.

Proportional

Full Access
Question # 5

What should the auditor look for to assess the adequacy of controls for non-profit organizations that are vulnerable to terrorist financing (TF) abuse? (Select Two.)

A.

Ongoing due diligence on the business relationship and scrutiny of transactions undertaken throughout the course of that relationship

B.

Exploitation of legitimate entities as conduits for TF for the purpose of escaping asset-freezing measures

C.

Concealing of the secretive diversion of funds intended for legitimate purposes to terrorist organizations

D.

Testing of the customer's identifying information using reliable and independent source documents

E.

The overall volume of cash deposit reporting for the quarter

Full Access
Question # 6

What conclusion should the auditor make regarding AML training for outsourced AML providers?

A.

The approach outlined by the Dank is deficient, as the service providers are not pan of the Dank s AML training during its staff onboarding.

B.

The approach outlined by the Dank is appropriate as the Dank can rely on a professional service provider to deliver the AML training program for the Dank s staff.

C.

The approach outlined by the Dank is deficient, as it does not provide controls for the Dank to verify training delivered by outsourced providers to the bank's staff is appropriate.

D.

The approach outlined by the bank Is appropriate as it considers practical issues such as time zone differences and availability of both classroom and online sessions.

Full Access
Question # 7

If a final audit communication contains a significant error, the chief audit executive must:

A.

recall the audit report assess the error and resubmit the correct one.

B.

report the error to the local AML regulator.

C.

reevaluate the item(s) and resubmit findings for discussion on factualaccuracy.

D.

tell those who received the communication of the error and corrections.

Full Access
Question # 8

During the auditing process the auditor finds that the entity never updates the customers risk assessment. Which remediation actions should the auditor suggest? (Select Two.)

A.

Compliance regularly updates the lists of high- and medium-risk countries to ensure updated customer risk profiles.

B.

Audit designates an audit manager to review customer profiles annually.

C.

Delete non-active customer profiles to reduce the workload of ongoing surveillance.

D.

Management engages an independent third party to update all the customer risk profiles.

E.

The business updates the customer risk profiles periodically in accordance with the customer risk level.

Full Access
Question # 9

A financial institution's (FI) risk assessment identified a lack of specific policies and procedures for existing privately-owned automated teller machine (ATM) customers.What would an auditorreview to assess whether this risk has been addressed?

A.

Prepare to audit a sample of the FI's privately-owned ATM customers.

B.

Draft policies and procedures for the FI's privately-owned ATM customers.

C.

Request data on the volume and value of transactions through the privately-owned ATM customers.

D.

Review the current risk assessment to determine the existence of privately-owned ATM customers.

Full Access
Question # 10

Which is considered a minimum requirement in a customer identification program?

A.

Transaction reporting procedures used to report suspicious transactions to the regulator

B.

Transaction monitoring procedures that specify the information that will be retained in each transaction

C.

Account opening procedures that specify the information that will be obtained from each customer

D.

Customer enhanced due diligence procedures used to identify unusual transactions

Full Access
Question # 11

Following completion of testing and tuning of the parameters and thresholds of the transaction monitoring model which final step should the team recommend as necessary to verify effective model functioning?

A.

Model validation

B.

Audit continuous monitoring

C.

Data validation

D.

Regulatory approvals

Full Access
Question # 12

Which should be requested from a financial institution (FI) prior to beginning a data integrity review?

A.

A report from the AML system showing the import of transactional data

B.

A document from the vendor confirming the data integrity of the AML system's software

C.

The FI's AML risk assessment

D.

An end-to-end diagram that depicts core elements such as source systems and data flows

Full Access
Question # 13

A financial institution is auditing its correspondent banking relationships and their respective sanctions compliance programs. Which condition will merit a higher sample size assuming the correspondent banks have a moderate level of risk mitigation?

A.

A fluctuating customer base in an international environment

B.

A well-known customer base m a localized environment

C.

A customer base changing due to a merger in the domestic market

D.

A stable customer base in an international environment

Full Access
Question # 14

Which requirement of a financial institution's compliance program should an auditor review first to understand key roles and responsibilities?

A.

Designation of an individual or individuals responsible for coordinating and monitoring day-to-day compliance

B.

List of high-risk customers subject to enhanced due diligence and the measures taken to mitigate the risks

C.

Names of politically exposed persons that are subject to ongoing monitoring

D.

List of suspicious transactions reported to the regulator

Full Access
Question # 15

When assessing the effectiveness of a transaction monitoring system, which indicators require active monitoring by the auditor or compliance'? (Select Two.)

A.

Data quality and mapping

B.

Scenario altering techniques

C.

Robustness of feedback relating to submitted suspicious activity reports

D.

False positive ratio

E.

Complexity of monitoring scenarios

Full Access
Question # 16

Which findings indicate issues that would cause a lack of understanding of the risks associated with the business the financial institution conducts? (Select Three.)

A.

Finding 1

B.

Finding 3

C.

Finding 4

D.

Finding 5

E.

Finding 6

F.

Finding 8

Full Access
Question # 17

When reviewing an entity's sanctions compliance program, the auditor should ensure who is exempt from the Office of Foreign Assets Control's regulations?

A.

US entities having branches outside the US

B.

Non-US entities having branches outside the US

C.

US citizens residing outside the

D.

Non-US citizens residing in the US

Full Access
Question # 18

As an auditor reviewing this investigation report, which indicates an effective process?

A.

The compliance officer concluded the investigation approximately 3 months later and filed a suspicious activity report.

B.

The compliance officer concluded from the report that there are reasonable grounds for suspicion and filed a suspicious activity report.

C.

The compliance officer filed a suspicious activity report and omitted details regarding the reason it was filed.

D.

The compliance officer decided not to cease the Business relationship hut kept the account under rigorous monitoring process.

Full Access
Question # 19

An audit determines that an important control is not being performed. The operational manager responds to the audit comment stating that they do not have adequate resources in the department to accomplish this task. The audit item discussion between the auditor and the operational manager is a(n):

A.

general license authorizing a transaction for an entity, and a specific license authorizing a transaction for an individual.

B.

internal control test.

C.

sustainability assessment.

D.

root cause analysis

Full Access
Question # 20

A financial institution utilizes an automated daily validation report to validate the accuracy of the data flowing into its monitoring software. An auditor is responsible for testing the data used to create the report. This is an example of testing which type of effectiveness?

A.

Program

B.

Software

C.

Design

D.

Operating

Full Access
Question # 21

Suspicious activity report testing in the last three audits did not identify any metrics to indicate that volume vanes dramatically each month. Which step should the auditor take next?

A.

Assign to continuous monitoring.

B.

Include the lack of metrics as a deficiency in the reporting.

C.

Escalate the finding regarding the lack of metrics to the board of directors.

D.

Review within the IT audit.

Full Access
Question # 22

What type of audit approach should the auditor use when testing KYC files as part of an AML examination?

A.

Horizontal

B.

Full scope

C.

Vertical

D.

Risk-based

Full Access
Question # 23

Which best explains why the auditor rates the audit finding on sanction screening severity high?

A.

The efficiency of the sanction screening tool is not properly tuned due to the wrong sanctions lists.

B.

The finding is on a different audit topic than the KYC related findings.

C.

The tool might miss potential sanction violations given the long intervals before the sanctions lists are updated.

D.

The organization might have reported a sanction breach that is not a current sanction violation.

Full Access
Question # 24

An auditor is writing the scope for an AML review of a financial institution. The objective is to evaluate how effectively existing controls are designed and operating. Which areas should be assessed? (Select Two.)

A.

Clients of the institution for more than 10 years

B.

Previous correspondent banking relationships

C.

Client base stability

D.

Recent audit findings

E.

AML corporate governance

Full Access
Question # 25

Which recommendation should the audit team provide to address transaction monitoring (TM) issues?

A.

Switch off those detection scenarios that are producing too many false positives.

B.

Apply the same thresholds across all client types to ensure alignment of risk coverage.

C.

Perform a coverage assessment of the current suite of TM detection scenarios against the bank's money laundering and terrorist financing risks

D.

Provide training for first-line staff on how to review and disposition TM alerts.

Full Access
Question # 26

The standard audit report format requires that an executive summary of the findings is included. Which statement is most appropriate for summarizing detailed findings'?

A.

Although the evidence of enhanced due diligence performed was not available audit was satisfied that the risk of higher risk clients has been appropriately mitigated.

B.

Deletion of transaction records for completed occasional transactions is operationally an efficient practice.

C.

The dealers have assured they are able to identify long-standing regular clients that are typically collectors and customers for occasional transactions.

D.

Evidence indicated inconsistent application of the client risk rating procedures and lack of evidence of enhanced due diligence measures for higher risk clients.

Full Access
Question # 27

Which task should an auditor complete first when preparing to audit the client risk scoring methodology?

A.

Query the completeness of the customer data to be provided.

B.

Discuss the client risk scoring process with the head of AML.

C.

Review the financial institution's AML risk assessment to understand the institution's client base.

D.

Review a list of high-risk customers provided by compliance.

Full Access