CAMS-CN Exam Question 136
金融行動特別工作小組(FATF)對各成員的相互評估是如何被評估的?
Correct Answer: A
A compliance officer should consider the following three factors as part of the approach to implement an enterprise-wide anti-money laundering program for a bank that operates in multiple countries:
* The types of customers serviced by the bank: Different types of customers may pose different levels of money laundering risk, depending on their nature, source of funds, geographic location, transaction patterns, and other factors. A compliance officer should identify and assess the money laundering risk associated with each customer type and segment, and apply appropriate due diligence measures, monitoring systems, and risk mitigation strategies accordingly12.
* The extent of anti-money laundering regulations in the various countries: A compliance officer should be aware of the legal and regulatory requirements and expectations for anti-money laundering compliance in each country where the bank operates, and ensure that the bank's policies and procedures are consistent with them. A compliance officer should also monitor any changes or updates in the anti- money laundering laws and regulations in the various countries, and adjust the bank's program accordingly34.
* The anti-money laundering risk posed by the products and services offered by the bank: Different products and services may have different features and functionalities that could be exploited by money launderers, such as anonymity, cross-border transfers, cash transactions,complex structures, or new technologies. A compliance officer should evaluate the money laundering risk associated with each product and service offered by the bank, and implement appropriate controls, safeguards, and oversight mechanisms to prevent and detect money laundering activities5 .
:
1: ACAMS, CAMS Study Guide, 6th Edition, Chapter 2: Risk Assessments
2: FATF, Guidance for a Risk-Based Approach: The Banking Sector
3: ACAMS, CAMS Study Guide, 6th Edition, Chapter 3: Compliance Standards for Anti-Money Laundering (AML) and Combating the Financing of Terrorism (CFT)
4: Deloitte, AML Program Effectiveness Reform
5: ACAMS, CAMS Study Guide, 6th Edition, Chapter 4: AML Program Design
[6]: OCC, Money Laundering: A Banker's Guide to Avoiding Problems
Reference: https://www.fatf-gafi.org/publications/mutualevaluations/documents/more-about-mutual- evaluations.html
* The types of customers serviced by the bank: Different types of customers may pose different levels of money laundering risk, depending on their nature, source of funds, geographic location, transaction patterns, and other factors. A compliance officer should identify and assess the money laundering risk associated with each customer type and segment, and apply appropriate due diligence measures, monitoring systems, and risk mitigation strategies accordingly12.
* The extent of anti-money laundering regulations in the various countries: A compliance officer should be aware of the legal and regulatory requirements and expectations for anti-money laundering compliance in each country where the bank operates, and ensure that the bank's policies and procedures are consistent with them. A compliance officer should also monitor any changes or updates in the anti- money laundering laws and regulations in the various countries, and adjust the bank's program accordingly34.
* The anti-money laundering risk posed by the products and services offered by the bank: Different products and services may have different features and functionalities that could be exploited by money launderers, such as anonymity, cross-border transfers, cash transactions,complex structures, or new technologies. A compliance officer should evaluate the money laundering risk associated with each product and service offered by the bank, and implement appropriate controls, safeguards, and oversight mechanisms to prevent and detect money laundering activities5 .
:
1: ACAMS, CAMS Study Guide, 6th Edition, Chapter 2: Risk Assessments
2: FATF, Guidance for a Risk-Based Approach: The Banking Sector
3: ACAMS, CAMS Study Guide, 6th Edition, Chapter 3: Compliance Standards for Anti-Money Laundering (AML) and Combating the Financing of Terrorism (CFT)
4: Deloitte, AML Program Effectiveness Reform
5: ACAMS, CAMS Study Guide, 6th Edition, Chapter 4: AML Program Design
[6]: OCC, Money Laundering: A Banker's Guide to Avoiding Problems
Reference: https://www.fatf-gafi.org/publications/mutualevaluations/documents/more-about-mutual- evaluations.html
CAMS-CN Exam Question 137
什麼樣的人應該對機構的反洗錢計畫進行獨立測試?
Correct Answer: C
According to the Anti-Money Laundering Specialist (the 6th edition) by ACAMS, the independent testing of an institution's anti-money laundering program should be conducted by a person who reports directly to the Board of Directors or a Board Committee. This ensures that the person conducting the testing has the necessary authority, independence, and objectivity to evaluate the program's adequacy and effectiveness, and to report any findings or recommendations to the senior management1. The person conducting the testing should also have the appropriate knowledge, skills, and experience in the anti-money laundering field, and should be familiar with the institution's products, services, customers, and risks2.
The other options are not necessarily suitable or qualified to perform the independent testing of an institution' s anti-money laundering program. For example:
* A certified specialist in the anti-money laundering field may have the relevant expertise and credentials, but may not have the required independence or reporting line to conduct the testing. For instance, if the certified specialist is an employee of the institution who is involved in the implementation or operation of the anti-money laundering program, then there may be a conflict of interest or a lack of objectivity in the testing process1.
* A former anti-money laundering officer from a similar institution may have the relevant experience and background, but may not have the current knowledge or familiarity with the institution's anti-money laundering program, policies, procedures, or systems. Moreover, the formeranti-money laundering officer may have a personal or professional relationship with the institution or its staff, which may compromise the independence or integrity of the testing process1.
* A retired government regulator or federal law enforcement officer may have the relevant authority and credibility, but may not have the specific skills or qualifications to conduct the testing. For instance, the retired regulator or law enforcement officer may not be well-versed in the latest anti-money laundering standards, regulations, or best practices, or may not be able to apply them to the institution's unique risk profile, products, services, or customers1.
:
Anti-Money Laundering Specialist (the 6th edition) by ACAMS
What Is An AML Compliance Program? | ComplyAdvantage
The other options are not necessarily suitable or qualified to perform the independent testing of an institution' s anti-money laundering program. For example:
* A certified specialist in the anti-money laundering field may have the relevant expertise and credentials, but may not have the required independence or reporting line to conduct the testing. For instance, if the certified specialist is an employee of the institution who is involved in the implementation or operation of the anti-money laundering program, then there may be a conflict of interest or a lack of objectivity in the testing process1.
* A former anti-money laundering officer from a similar institution may have the relevant experience and background, but may not have the current knowledge or familiarity with the institution's anti-money laundering program, policies, procedures, or systems. Moreover, the formeranti-money laundering officer may have a personal or professional relationship with the institution or its staff, which may compromise the independence or integrity of the testing process1.
* A retired government regulator or federal law enforcement officer may have the relevant authority and credibility, but may not have the specific skills or qualifications to conduct the testing. For instance, the retired regulator or law enforcement officer may not be well-versed in the latest anti-money laundering standards, regulations, or best practices, or may not be able to apply them to the institution's unique risk profile, products, services, or customers1.
:
Anti-Money Laundering Specialist (the 6th edition) by ACAMS
What Is An AML Compliance Program? | ComplyAdvantage
CAMS-CN Exam Question 138
歐盟的「骯髒反洗錢」指令有哪些要求?{選兩項。)
Correct Answer: A,C
A . Promoting the record-keeping obligations of banks to the maximum amount of data necessary for the purposes of AML investigations: "The Fifth AML Directive emphasizes that record-keeping obligations of banks must extend to the maximum amount of data necessary for the purposes of anti-money laundering investigations" (CAMS Manual, 6th Edition, page 79).
C . Extending AML rules to entities that provide virtual currency services: "The 5AMLD expands the scope of the EU's anti-money laundering rules to include virtual currency exchange platforms and custodian wallet providers" (CAMS Manual, 6th Edition, page 80).
Top of Form
Bottom of Form
C . Extending AML rules to entities that provide virtual currency services: "The 5AMLD expands the scope of the EU's anti-money laundering rules to include virtual currency exchange platforms and custodian wallet providers" (CAMS Manual, 6th Edition, page 80).
Top of Form
Bottom of Form
CAMS-CN Exam Question 139
哪些活動可能被視為潛在的魚叉式網路釣魚詐騙?(選三。)
Correct Answer: B,C,E
The activities that could be considered a potential spear phishing scam are:
A courier delivers a duplicate invoice to a business that contains updated payment details of an existing supplier. This could be a way of diverting funds to a fraudulent account by impersonating a legitimate vendor and exploiting the trust relationship between the business and the supplier1.
Payroll receives an external email from an employee looking to update their bank account information. This could be a way of stealing money from the employee or the employer by pretending to be the employee and requesting a change in the payment method or destination2.
An employee receives an email that asks to download an attachment, but the attachment is a malware. This could be a way of infecting the employee's computer or network with malicious software that could compromise sensitive data, disrupt operations, or demand ransom3.
The other options are not necessarily spear phishing scams, although they may be other types of fraud or deception. For example:
An employee receives a phone call requesting that money be sent to assist someone in trouble. This could be a vishing scam, which is a form of voice phishing that uses phone calls to solicit personal or financial information or to request money transfers4.
A business sends its employees an email warning that email passwords must be changed to prevent cyber- fraud. This could be a legitimate security measure, or it could be a phishing scam, which is a form of email phishing that targets a broad audience and tries to trick them into revealing their credentials or clicking on malicious links.
Members of a religious organization receive a donation request by email claiming to be from their leader. This could be a genuine appeal, or it could be a social engineering scam, which is a form of manipulation that exploits the human factor and relies on the victim's emotions, trust, or sympathy.
References:
ACAMS CAMS Certification Video Training Course - Exam-Labs3
Exam CAMS: Certified Anti-Money Laundering Specialist (the 6th edition)4 ACAMS Study Guide for the Certification Examination, 6th Edition, Chapter 3, page 53: https://www.acams.
org/wp-content/uploads/2019/08/ACAMS-Study-Guide-6th-Edition-Chapter-3.pdf ACAMS Study Guide for the Certification Examination, 6th Edition, Chapter 3, page 54: https://www.acams.
org/wp-content/uploads/2019/08/ACAMS-Study-Guide-6th-Edition-Chapter-3.pdf ACAMS Study Guide for the Certification Examination, 6th Edition, Chapter 3, page 55: https://www.acams.
org/wp-content/uploads/2019/08/ACAMS-Study-Guide-6th-Edition-Chapter-3.pdf ACAMS Study Guide for the Certification Examination, 6th Edition, Chapter 3, page 56: https://www.acams.
org/wp-content/uploads/2019/08/ACAMS-Study-Guide-6th-Edition-Chapter-3.pdf
A courier delivers a duplicate invoice to a business that contains updated payment details of an existing supplier. This could be a way of diverting funds to a fraudulent account by impersonating a legitimate vendor and exploiting the trust relationship between the business and the supplier1.
Payroll receives an external email from an employee looking to update their bank account information. This could be a way of stealing money from the employee or the employer by pretending to be the employee and requesting a change in the payment method or destination2.
An employee receives an email that asks to download an attachment, but the attachment is a malware. This could be a way of infecting the employee's computer or network with malicious software that could compromise sensitive data, disrupt operations, or demand ransom3.
The other options are not necessarily spear phishing scams, although they may be other types of fraud or deception. For example:
An employee receives a phone call requesting that money be sent to assist someone in trouble. This could be a vishing scam, which is a form of voice phishing that uses phone calls to solicit personal or financial information or to request money transfers4.
A business sends its employees an email warning that email passwords must be changed to prevent cyber- fraud. This could be a legitimate security measure, or it could be a phishing scam, which is a form of email phishing that targets a broad audience and tries to trick them into revealing their credentials or clicking on malicious links.
Members of a religious organization receive a donation request by email claiming to be from their leader. This could be a genuine appeal, or it could be a social engineering scam, which is a form of manipulation that exploits the human factor and relies on the victim's emotions, trust, or sympathy.
References:
ACAMS CAMS Certification Video Training Course - Exam-Labs3
Exam CAMS: Certified Anti-Money Laundering Specialist (the 6th edition)4 ACAMS Study Guide for the Certification Examination, 6th Edition, Chapter 3, page 53: https://www.acams.
org/wp-content/uploads/2019/08/ACAMS-Study-Guide-6th-Edition-Chapter-3.pdf ACAMS Study Guide for the Certification Examination, 6th Edition, Chapter 3, page 54: https://www.acams.
org/wp-content/uploads/2019/08/ACAMS-Study-Guide-6th-Edition-Chapter-3.pdf ACAMS Study Guide for the Certification Examination, 6th Edition, Chapter 3, page 55: https://www.acams.
org/wp-content/uploads/2019/08/ACAMS-Study-Guide-6th-Edition-Chapter-3.pdf ACAMS Study Guide for the Certification Examination, 6th Edition, Chapter 3, page 56: https://www.acams.
org/wp-content/uploads/2019/08/ACAMS-Study-Guide-6th-Edition-Chapter-3.pdf
CAMS-CN Exam Question 140
哪些陳述描述了與國際商業公司相關的風險?(選兩個。)
Correct Answer: C,E
International business corporations (IBCs) are entities that are created in jurisdictions that offer low or no taxes, high confidentiality, and minimal regulation. They are often used by individuals and businesses to avoid or evade taxes, conceal assets, and launder money. Some of the risks associated with IBCs are:
They are created in a tax haven. Tax havens are countries or territories that have low or no taxes, lax financial regulation, and high secrecy. They attract IBCs that seek to reduce their tax liabilities, hide their beneficial owners, and evade scrutiny from authorities. Tax havens pose a risk to the global financial system, as they facilitate tax evasion, money laundering, corruption, and illicit financial flows12.
They are established with nominee directors. Nominee directors are individuals who act as the legal representatives of an IBC, but have no actual control or authority over its activities. They are often used to shield the true beneficial owners of the IBC from detection and accountability. Nominee directors pose a risk to the transparency and integrity of the IBC, as they can enable fraud, tax evasion, money laundering, and other criminal activities34.
References:
1, ACAMS CAMS Certification Study Guide, 6th Edition, Chapter 2, page 38
2, ACAMS CAMS Certification Video Training Course, Module 2, Lesson 2.3, Offshore Financial Centers
3, ACAMS CAMS Certification Study Guide, 6th Edition, Chapter 2, page 39
4, ACAMS CAMS Certification Video Training Course, Module 2, Lesson 2.4, Money Laundering Using New Payment Methods
They are created in a tax haven. Tax havens are countries or territories that have low or no taxes, lax financial regulation, and high secrecy. They attract IBCs that seek to reduce their tax liabilities, hide their beneficial owners, and evade scrutiny from authorities. Tax havens pose a risk to the global financial system, as they facilitate tax evasion, money laundering, corruption, and illicit financial flows12.
They are established with nominee directors. Nominee directors are individuals who act as the legal representatives of an IBC, but have no actual control or authority over its activities. They are often used to shield the true beneficial owners of the IBC from detection and accountability. Nominee directors pose a risk to the transparency and integrity of the IBC, as they can enable fraud, tax evasion, money laundering, and other criminal activities34.
References:
1, ACAMS CAMS Certification Study Guide, 6th Edition, Chapter 2, page 38
2, ACAMS CAMS Certification Video Training Course, Module 2, Lesson 2.3, Offshore Financial Centers
3, ACAMS CAMS Certification Study Guide, 6th Edition, Chapter 2, page 39
4, ACAMS CAMS Certification Video Training Course, Module 2, Lesson 2.4, Money Laundering Using New Payment Methods
- Other Version
- 260ACAMS.CAMS-CN.v2026-01-03.q410
- 174ACAMS.CAMS-CN.v2025-12-05.q105
- 739ACAMS.CAMS-CN.v2024-10-09.q307
- Latest Upload
- 119SAP.C_BCBAI_2509.v2026-01-15.q13
- 215DAMA.DMF-1220.v2026-01-15.q271
- 138SAP.C_SIGDA_2403.v2026-01-15.q66
- 244ISACA.CRISC.v2026-01-15.q649
- 128PaloAltoNetworks.NetSec-Pro.v2026-01-15.q26
- 170Splunk.SPLK-1002.v2026-01-14.q121
- 170EMC.NCP-AII.v2026-01-14.q144
- 164Microsoft.AZ-800.v2026-01-13.q144
- 176Microsoft.MS-102.v2026-01-13.q258
- 122HP.HPE2-E84.v2026-01-13.q17
[×]
Download PDF File
Enter your email address to download ACAMS.CAMS-CN.v2025-11-29.q308 Practice Test
