Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CCAS ACAMS Certified Cryptoasset Anti-Financial Crime Specialist Examination Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ACAMS CCAS Certified Cryptoasset Anti-Financial Crime Specialist Examination certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 100 questions

An analyst at a virtual asset service provider (VASP) that white-labels its exchange solution to other cross-border VASPs is developing a VASP onboarding procedure. Under Financial Action Task Force Recommendation 13, which CDD practices should be applied to such relationships? (Select Three.)

A.

Obtain approval from the local supervisory authority

B.

Assess the profitability of the VASP relationship

C.

Assess the nature and purpose of the VASP relationship

D.

Obtain approval from senior management

E.

Assess the VASP’s supervision and if a license/registration is needed

Which blockchain type is accessible only to a single organization?

A.

Public

B.

Private

C.

Consortium

D.

Hybrid

The Financial Action Task Force recommends countries require virtual asset service providers to maintain all records of transactions and customer due diligence measures for a minimum of:

A.

6 months

B.

2 years

C.

5 years

D.

7 years

Which virtual asset relies on an account-based ledger model?

A.

Litecoin

B.

Ethereum

C.

Bitcoin

D.

Monero

Which privacy-enhancing feature hides both the sender and receiver in a transaction?

A.

Ring signatures

B.

Multi-sig

C.

Proof-of-Authority

D.

Token swap

Which blockchain analysis red flag is linked to terrorism financing?

A.

Microtransactions to donation addresses

B.

Large OTC trades

C.

Proof-of-Stake staking

D.

Smart contract creation

In the context of forensic cryptocurrency investigations, which statement best describes how attribution data are collected?

A.

Taken from business-maintained records.

B.

Derived from public and non-public sources.

C.

Gathered from a publicly available blockchain.

D.

Obtained automatically from the darknet.

What is a “smart contract”?

A.

A legal agreement stored offline.

B.

A self-executing code stored on blockchain.

C.

A compliance monitoring tool.

D.

A cold storage wallet type.

A customer who runs a cryptoasset automated teller machine (ATM) comes into a financial institution and deposits a larger than usual amount. When asked about the deposit, the customer answers there has been broader adoption of cryptoassets in the region where the ATM is located. Which additional information about the business would indicate high risk for money laundering? (Select Two.)

A.

The volume and the number of users increase.

B.

The cryptoasset ATM supports a variety of cryptoassets.

C.

The region is neighboring with a narcotic-producing jurisdiction.

D.

The region is located within a high-risk jurisdiction.

E.

The cryptoasset ATM was recently licensed.

What is the “Travel Rule” under FATF guidance?

A.

A requirement to record customer addresses for all crypto transfers

B.

A requirement to transmit originator and beneficiary information with crypto transfers above a threshold

C.

A requirement to freeze funds sent across borders

D.

A rule for declaring crypto holdings at customs

How should an investigator use transaction history to determine whether cryptoassets were previously involved in money laundering?

A.

Assess the identity of the cryptoasset owner.

B.

Assess other assets held by the cryptoasset owner.

C.

Assess the cryptoasset addresses' receiving exposure to illicit activity.

D.

Assess the jurisdiction where the transactions took place.

Misconfigured smart contracts can allow which type of scam to occur?

A.

Phishing

B.

SIM

C.

Rug pull

D.

Ransomware

Which token type should be considered as carrying the highest risk when assessing the AML risks related to the customer's source of funds?

A.

Privacy

B.

Stablecoin

C.

Platform

D.

Security

Which level of an organization is ultimately responsible for risk oversight?

A.

1st line compliance team

B.

2nd line compliance team

C.

Chief risk officer

D.

Board of directors

What is the intention of the Financial Action Task Force's (FATF's) Travel Rule?

A.

To enhance customer due diligence (CDD) procedures to ensure high quality data

B.

To slow down cryptoasset transactions to allow law enforcement to intervene

C.

To mitigate money laundering and terrorist financing (ML/TF) risk by increasing the ability to follow funds via different financial institutions

Which operational risk mitigation practice by virtual asset service providers (VASPs) is most effective when considering their relationships with other VASPs?

A.

Having no requirement to establish a correspondent relationship and build a risk assessment framework among other cryptoasset exchanges prior to transferring for or on behalf of another person

B.

Developing cross-border correspondent relationships with cryptoasset exchanges in jurisdictions that have weak or non-existent anti-money laundering (AML) regulation or supervision

C.

Assigning all such relationships as high risk and conducting enhanced due diligence on all of them

D.

Gathering sufficient information on the counterpart VASP to determine the quality of the supervision it receives for transactional activities

How does law enforcement use Suspicious Activity Reports (SARs)? (Select Two.)

A.

To identify regulatory failings

B.

To produce evidence of money laundering that can be used in court

C.

To develop intelligence on new targets

D.

To confirm or develop information on existing targets

What is the correct risk assessment equation used in AML/CFT compliance frameworks, including for cryptoasset risk evaluations?

A.

Inherent Risk – Control Effectiveness = Residual Risk

B.

Inherent Risk – Residual Risk = Control Effectiveness

C.

Residual Risk + Control Effectiveness = Inherent Risk

D.

Inherent Risk + Control Effectiveness = Residual Risk

Which activity should be detected as a red flag during the customer onboarding stage and further investigated?

A.

Receipt of a law enforcement request to examine transactions on the customer's account

B.

The applicant being located in the same jurisdiction as the virtual asset service provider

C.

The use of a foreign identification document by an immigrant

D.

Sharing of the same IP address by multiple customers

A suspicious activity report was filed in the EU for a local company account that held funds generated by the sale of product coupons. A review of the account highlighted a login from an unconnected IP address. Despite repeated requests, the customer failed to provide information on the origins of the funds. Which is the main red flag here?

A.

Virtual asset service providers outside of the EU are being relied upon.

B.

Funds are generated by the sale of coupons which are connected to a physical product.

C.

There is a failure to cooperate with the source of funds requests.

D.

An IP address is being used that is not previously connected to that customer.

Page: 1 / 2
Total 100 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved