Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the ACFCS Certified Financial Crime Specialist CFCS Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CFCS Premium Access

View all detail and faqs for the CFCS exam


791 Students Passed

90% Average Score

96% Same Questions
Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
Questions # 41:

You work in cybersecurity lor a chain of retail stores. An employee in your security team has recently notified you of a potentially serious issue with the point of sale (POS) systems which run on the company s network Upon reviewing data being transmitted Irom the POS systems the employee has detected indicators that malware designed to scrape credit and debit card information is being run on the systems.

You immediately mobilize your cyber incident response team and begin investigating You discover thai the malware infection is widespread and that numerous stores are affected.

In the course of the investigation you discover the following information Which is the MOST likely vulnerability that led to this cybersecurity incident?

Options:

A.

Your company had not recently run password cracking tests against the portals used to log in to the POS systems

B.

The software applications supporting the POS system were configured to automatically install updates when available

C.

The network running the POS system was also used for Ihe online portal that employees used to log their hours

D.

Employees at several stores were accessing unsecured Wi-Fi networks during work hours on their personal devices

Questions # 42:

Your bank has recently received an online application for a new business account from a company named ACE Operations, LLC By reviewing the operating agreement and other documents included in the application, you determine that ACE is incorporated in the U S state of Wyoming.

A review of the Wyoming corporate registry online shows that ACE was formed 15 years ago. An initial Internet search produces no company website or further information about the company. The registered agent's contact information and address on the company's most recent annual filing is for Capital Solutions a corporate services provider.

Concerned that ACE Operations appears to be a shelf corporation you are conducting further due diligence on the company's ownership structure Which is the MOST appropriate next step to take?

Options:

A.

Request that the registered agent submit a self-certification of any parties with a 51% or greater ownership stake in ACE Operations

B.

Research annual filings in the corporate registry to determine if ACE Operations had any previous owners

C.

Request a company organizational chart that includes members, directors, and other stakeholders

D.

Request a certificate of good standing from the Wyoming corporate registry for ACE Operations

Questions # 43:

Mr. Johnson, the compliance officer of XYZ Bank, is conducting an organizational overview of financial crime controls. During his review, he notices discrepancies in the transaction monitoring process. What is the most appropriate action for Mr. Johnson to take next?

Options:

A.

Ignore the discrepancies as they might be insignificant.

B.

Immediately report the discrepancies to senior management and the relevant authorities.

C.

Discuss the discrepancies with the employees responsible for transaction monitoring.

D.

Wait for the next compliance audit to address the discrepancies.

Questions # 44:

Recently your database of customer records was compromised and hundreds of thousands of customer's personal data was stolen Based on the feedback from your customers you have surmised that the following occurred.

• Using the stolen customer information a personalized email was sent to all of the customers Irom the criminals with a significant amount of personal information in them to appear legitimate directing them to a fake website mimicking yours

• That fake website captured logins and passwords from customers for later use

• The criminals then used the logins and passwords to wire funds from those accounts to offshore accounts that they controlled

Which type of attack is this?

Options:

A.

Spear phishing

B.

Key logging

C.

Man-in-the-middle

D.

Login capture

Questions # 45:

A client is introduced to a bank by an intermediary The intermediary is a reputable financial institution that is regulated in a foreign FATF compliant jurisdiction Regulation applicable to the bank requires the bank conduct due diligence with respect to the intermediary's clients

Which statement is true in this situation according to the 2012 Wolfsberg Principles on Intermediaries?

Options:

A.

It is not necessary (or a bank to perform due diligence on the intermediary's clients

B.

The bank can rely on the intermediary's due diligence information because it is regulated in a foreign FATF compliant jurisdiction

C.

The bank should perform its own due diligence on the underlying clients and may not rely on the intermediary to assist in obtaining due diligence information on the clients

D.

The bank may rely on the intermediary to assist in obtaining relevant due diligence information with regard to the intermediary clients

Questions # 46:

John purchased a property live years ago Real estate records show that two years ago, John transferred his interest to a third parley Susan. Susan obtained a mortgage on the properly with a mortgage company Company Z.

John maintains the properly and pays the mortgage and taxes John only lives there on the weekends John also rents a room to someone who lives at the property full time.

You are the investigator tasked with identifying the property's beneficial owner Who is the beneficial owner?

Options:

A.

John

B.

Company Z

C.

Susan

D.

Renter

Questions # 47:

Which scenario is an example of the placement stage of money laundering?

Options:

A.

A multiple lax refund scheme fraudster transfers the proceeds of his illicit tax refund from a prepaid debit card to a foreign bank account through an online funds transfer service

B.

A Ponzi scheme operator uses his debit card associated with his British Virgin Islands bank account to withdraw cash from an ATM machine in the U.S.

C.

A money laundering organization moves illicit drug proceeds into the U S financial system through a wire transfer into the correspondent account of a Guatemalan Bank domiciled at a U S financial institution

D.

A Mexican money broker deploys couriers across the U S border where they deposit drug cash into the U S National Bank of San Diego

Questions # 48:

Bank A receives a wire transfer Irom Bank B located in another country. When run through Bank A's sanctions screening process, some of the identifying information of the entity initialing the transfer appears as a partial match with an entity on a sanctions list Bank A routinely processes wire transfers from Bank B and almost never runs into matches with sanctions lists.

Which further review should Bank A conduct on the wire transfer?

Options:

A.

Bank A should reject the wire transfer and alert the regulatory or enforcement agency that administers the sanction immediately

B.

Bank A should contact Bank B lor confirmation that the entity is not on the sanctions list Once it receives written confirmation from Bank B's compliance staff it can complete the transfer without further investigation

C.

Bank A should not complete the wire transfer until it gathers more information It should consult the full identifying information in the sanctions entry and attempt to find that information in the transfer

D.

No review is required Bank B would already have conducted due diligence for sanctions violations and further action would be duplicative and unnecessary

Questions # 49:

Mr. X is a business consultant who specializes in helping European companies expand their operations into Latin America. You are part of a law enforcement unit investigating Mr. X who is under suspicion of assisting his clients to conceal bribe payments made to government officials in Latin American countries.

Mr. X is knowntocontrol a numberofdifferent companies andtheirrelated subsidiaries within severalLamAmerican countries. You are tracing (fundsthat originated from an account held by one of Mr.X's companies in the UK in an effort to establish that he is involved in the corruption and money laundering scheme.

Which would provide the BEST indicatorThatMr.X is helping to launder funds connected to bribery?

Options:

A.

Funds whose source can be traced to a corporate account in a country located in the European Union

B.

Funds transferred to business associates of Mr.X located in the European Union

C.

Funds that are being used in the operation of a business in ahigh-riskjurisdiction

D.

Funds transferred into the account from a nondescript business with little information available about it

Questions # 50:

You are a fraud investigator lor a U S securities firm. You are currently investigating potential market manipulation involving stock in a company that was created in the Channel Islands.

One of your brokers has 500,000 shares of this stock in several of his customer's accounts This stock had no trading activity for the past several years In Ihe past 30days he has been selling stock in 5,000-share increments every day from his customer accounts.

Upon review of your firm's books you notice that none of your other customers have bought this stock. Your firm has filed a Suspicious Activity Report (SAR) on this activity. Since this activity is putting your firm at risk you decide to contact your regulator and law enforcement to further the investigation Which items do these agencies have access to that you would not? Choose 2 answers

Options:

A.

Emails sent by your broker regarding Ihe selling activity

B.

The names of Ihe beneficial owners of the company

C.

SARs filed at other U S securities firms

D.

The names of the individuals purchasing Ihe stock

Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.