Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which recommendation should the audit team provide to address transaction monitoring (TM) issues?

A.

Switch off those detection scenarios that are producing too many false positives.

B.

Apply the same thresholds across all client types to ensure alignment of risk coverage.

C.

Perform a coverage assessment of the current suite of TM detection scenarios against the bank's money laundering and terrorist financing risks

D.

Provide training for first-line staff on how to review and disposition TM alerts.

Full Access
Question # 5

A recent regulatory examination identified serious deficiencies in the AML program. Which action should the organization take first?

A.

Enhance the ongoing employee training program so that employees are aware of their respective AML roles and responsibilities.

B.

Initiate a request for proposals for new AML systems and solutions.

C.

Engage a qualified third party to review the deficiencies and assist in developing a remediation plan.

D.

Change the designated head of AML compliance and request the newly appointed head of AML compliance produce a remediation plan.

Full Access
Question # 6

A financial institution (FI) recently updated its transaction monitoring (TM) thresholds During validation which should be provided as evidence of optimized thresholds'? (Select Two.)

A.

A copy of the FI's AML risk assessment

B.

Comparison against past suspicious activity reported

C.

Above-the-line and below-the-line testing

D.

Length of time the FI has deployed the software program

E.

Proof of validation from the TM software provider

Full Access
Question # 7

As an auditor reviewing this investigation report, which indicates an effective process?

A.

The compliance officer concluded the investigation approximately 3 months later and filed a suspicious activity report.

B.

The compliance officer concluded from the report that there are reasonable grounds for suspicion and filed a suspicious activity report.

C.

The compliance officer filed a suspicious activity report and omitted details regarding the reason it was filed.

D.

The compliance officer decided not to cease the Business relationship hut kept the account under rigorous monitoring process.

Full Access
Question # 8

The auditor determines that the population for transaction monitoring testing can be stratified into five distinct categories. To complete testing which sampling method should the auditor use to identify the sample size?

A.

Judgmental

B.

Proportional

C.

Statistical

D.

Risk-based

Full Access
Question # 9

Following completion of testing and tuning of the parameters and thresholds of the transaction monitoring model which final step should the team recommend as necessary to verify effective model functioning?

A.

Model validation

B.

Audit continuous monitoring

C.

Data validation

D.

Regulatory approvals

Full Access
Question # 10

Which circumstance would impair an auditor's independence and objectivity?

A.

Attending internal meetings where key risk indicators are discussed

B.

Donating funds to a local chanty which relates to the organization being audited

C.

Working with staff to design and implement key controls

D.

Presenting at a local audit industry event where best practices are discussed

Full Access
Question # 11

Which is the most significant risk associated with KYC requirements being considered a low priority not designed into processes and subsequently implemented after the products are already launched?

A.

Product launches may not be adequately prepared.

B.

Client experience improves as accounts can be opened more quickly.

C.

Product launches will motivate frontline to get more customers.

D.

Frontline will not complete adequate CDD.

Full Access
Question # 12

An auditor plans to examine a sample targeting newly onboarded, high net-worth clients to assess adherence to their onboarding policies. What sampling methods should the auditor use? (Select Three.)

A.

Judgment sampling

B.

Stratified sampling

C.

Discovery sampling

D.

Simple random sampling

E.

Snowball sampling

F.

Systematic sampling

Full Access
Question # 13

The auditor finds that thecustomer risk assessment (CRA) is completed at initial onboarding and is repealed for each customer every other year. The auditor’s observations should Include that the CRA should:

A.

be updated more often given the risk of the entity.

B.

include an assessment of jurisdiction where the customer currently resides as this may have changed.

C.

allow for sales oy third patties other than advisors since most of the customers are local residents.

D.

include a qualitative overlay that 95% of the products offered are subject to regulatory exemptions.

Full Access
Question # 14

The company has automated the completion of the customer risk assessment (CRA) into its main customer relationship management (CRM) system The CRM has needs recording the overall risk level assessed (Standard. Enhanced), the ID number of the staff member who completed the assessment, and me date of the last assessment Which additional fields should the auditor recommend to document the CRA process? (Select Three.)

A.

Age (Years)

B.

Risk factors (Y/N. if Y please specify)

C.

Type of customer (Trust. Company Individual)

D.

Annual premium (S)

E.

Residence (Country)

F.

Photo ID taken (Passport Driver’s License. Other)

Full Access
Question # 15

Findings from a financial institution's (Fl's) regulatory examination suggest that several unidentified risks pose a serious threat. The Fl identifies the risks and implements a set of controls to mitigate those risks. Which type of risk considers the controls' effectiveness?

A.

Aggregate

B.

Consolidated

C.

Inherent

D.

Residual

Full Access
Question # 16

Which findings indicate issues that would cause a lack of understanding of the risks associated with the business the financial institution conducts? (Select Three.)

A.

Finding 1

B.

Finding 3

C.

Finding 4

D.

Finding 5

E.

Finding 6

F.

Finding 8

Full Access
Question # 17

Audits are designed to provide assurance that what key aspect of risk management framework is adequately designed and functioning effectively?

A.

Procedures

B.

Controls

C.

Reporting

D.

Risks

Full Access
Question # 18

What should an auditor verify when auditing areas with previously identified AMI deficiencies?

A.

Management took appropriate and timely action to address any violations and other deficiencies.

B.

Senior management agreed that the findings were legitimate.

C.

Management discussed an action plan to address any violations and other deficiencies.

D.

The business attested to remediating the control gaps.

Full Access
Question # 19

Which should be evaluated when analyzing components of risk mitigation in an AML risk assessment? (Select Two.)

A.

Liquidity risk

B.

Product risk

C.

Overall customer volume

D.

Office of Foreign Assets Control filtering

E.

Customer risk

Full Access
Question # 20

Which finding indicates issues that could result in clients being subject to incorrect scenarios and thresholds?

A.

Firming 2

B.

Finding 4

C.

Finding 5

D.

Finding 7

Full Access
Question # 21

Review of client files reveals that staff members have been performing negative media searches for clients only when they recognize the client name. When an interesting story is identified a print of the results is inserted in the client file. There are no clear procedures on adverse media screening. Which should the auditor recommend? {Select Two.)

A.

Evidence of negative media screening retained in client files must comprise negative reports only.

B.

All staff members should be provided with additional training to ensure they adhere to standard procedures.

C.

Identification of relevant reports via adverse media searches must be escalated for an assessment for materiality.

D.

Privacy regulation requires that clients who have a print copy of the adverse media m their files should be notified.

E.

Procedures should be enhanced to require that all clients are subject to regular negative media screening.

Full Access
Question # 22

During a sanction review, an auditor notes that several of the bank's large corporate clients continue to route transactions through the bank to certain Office of Foreign AssetsControl (OFAC)-sanctioned countries.The head of corporate clients stated that these transactions were executed under the OFAC license.What should an auditor know to distinguish between an OFAC general license and a specific license?

A.

A general license authorizes a type of transaction and a specific license authorizes a transaction in response to a written license application.

B.

A specific license authorizes a transaction for an entity and a general license authorizes a transaction for an individual.

C.

A general license authorizes a transaction for an entity and a specific license authorizes a transaction for an individual.

D.

A specific license authorizes a type of transaction and a general license authorizes a transaction in response to a written license application.

Full Access
Question # 23

What is the role of the internal audit in the governance process?

A.

Perform quality assurance testing of transaction monitoring.

B.

Monitor the risks of noncompliance with applicable laws and regulations.

C.

Periodically evaluate the effectiveness of processes and controls.

D.

Execute the corrective action plan.

Full Access
Question # 24

in addition to this investigation report, what Information should the auditor expect to find in the investigative file? (Select Two.)

A.

Board approval for the suspicious activity report filing by the compliance department.

B.

Independent review by the compliance officer's line manager.

C.

Adverse news search results against the customers and its controlling persons.

D.

Policies and procedures relating to AML investigations and suspicious activity report filing.

E.

Historical transaction data of the customer s account.

Full Access
Question # 25

Which products/services increase the risk level for money laundering for XYZ Bank?

A.

Payable through accounts

B.

International fund transfers

C.

Letters of credit

D.

Foreign exchange services

Full Access
Question # 26

Which should the external auditor recommend to ensure that the institution did not facilitate transactions involving a sanctioned person?

A.

Re-screen all transactions over the period of time when the updated sanction lists were not uploaded against the current sanctions lists.

B.

Perform a security risk and access assessment on the sanction screening tool to ensure more timely sanctions lists are uploaded.

C.

Re-screen all transactions based on the sanctions lists that were active at that time but not uploaded.

D.

Periodically monitor the sanctions lists uploaded by the screening tool to ensure the most up-to-date lists are in the system.

Full Access
Question # 27

Which is a true statement about the computer-assisted audit tool (CAAT)?

A.

Both CAAT and traditional methods of auditing allow auditors to build conclusions based upon a limited sample of a population.

B.

KYC data that have been incorporated into the warehouse could still be changed if need be from using CAAT.

C.

Auditors using CAAT could have all customer addresses from the past 10 years while auditors using traditional methods of auditing could only have a sample of these customer addresses.

D.

CAAT cannot be customized to scrutinize huge volumes of data and produce specific procedures that could replace the requirement for the auditor's own procedures.

Full Access