Study Guide Flashcards

(68 cards)

1
Q

What is the correct response when high-risk indicators are present in a customer file?

A

Escalate the case to your compliance department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why can’t you delay research or skip compliance steps to open an account?

A

It exposes your organization to significant risk and violates regulatory expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary purpose of KYC?

A

To manage financial crime risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does ‘risk appetite’ mean in KYC?

A

The level of risk an organization is willing to accept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a risk-based approach?
(Low, medium,high)

A

applies controls based on the risk level of the customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is due diligence at onboarding important?

A

It builds a strong customer profile and monitoring and reduces risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are common KYC risk classification levels?

A

Low, Medium, and High.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who can be considered a customer in KYC?

A

Individuals, listed companies, private companies, trusts, partnerships, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are trusts higher risk?

A

They can obscure true ownership and business purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a PEP (Politically Exposed Person)?

A

An individual in a prominent public role, often posing higher financial crime risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are financial institutions categorized as high to low risk?

A

Depending on their function—e.g., central banks (low risk), money transmitters (high risk).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is jurisdiction risk in KYC?

A

doing business in countries with high corruption, weak AML laws, or instability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are red flags for jurisdiction risk?

A

Poor AML laws, high corruption, sanctions, secrecy jurisdictions, and shell company hubs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of high-risk jurisdictions?

A

Cayman Islands, British Virgin Islands, North Korea.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What global sources help identify jurisdiction risk?

A

Transparency International’s Corruption Index, U.S. State Department Narcotics Report, UN, FATF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are regional risk zones within a country?

A

Port cities, free trade zones, border areas, or regions known for financial/drug crimes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is product risk in KYC?

A

used for illegal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What makes a product high risk?

A

Ease of anonymous use, rapid movement of funds, or access across jurisdictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is channel risk?

A

how a customer interacts with the institution—especially remote or non-face-to-face.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why is non-face-to-face contact a risk?

A

It limits identity verification and is harder to monitor for unusual behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What factors increase channel risk?

A

Internet banking, mobile onboarding, and transactions without physical presence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the Three Lines of Defense in KYC?

A
  1. Front-line business units 2. AFC compliance/risk functions 3. Internal audit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the role of the first line of defense?

A

Customer-facing teams that apply policies, perform due diligence, and implement controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the role of the second line of defense?

A

Compliance functions like the MLRO who oversee AFC policies and manage risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the role of the third line of defense?
Internal audit provides independent review of the effectiveness of controls.
26
Why must the second line of defense avoid conflicts of interest?
To remain unbiased and ensure regulatory compliance is enforced properly.
27
What is the benefit of planning your research in KYC?
You gather only what's necessary for decision-making—no more, no less.
28
What does the 'Assess' step of the research process help you do?
Filter useful vs. irrelevant info and know when your review is complete.
29
What is FATF Recommendation 10 about?
Institutions must take reasonable steps to verify beneficial ownership.
30
How does sanctions compliance differ from AML ownership rules?
Each level of ownership is assessed separately for sanctions—not multiplied.
31
When must an institution go beyond customer representations for UBO?
When required by jurisdiction or internal policy based on risk.
32
What does a centralized beneficial ownership registry do?
Stores verified ownership info accessible by institutions and regulators.
33
Can institutions rely on customer-certified ownership claims?
Yes, if local law allows and reliance is reasonable and documented.
34
What is the 'Explore' step in KYC research?
It involves gathering and verifying customer info using tools, interviews, and screening.
35
What does effective exploring involve?
Screening, negative news checks, verifying registration, and reviewing business presence.
36
What tools can help in the Explore step?
Sanctions lists, mapping tools, business registries, websites, and investigator reports.
37
When should you revisit the Explore step?
When organizing info reveals gaps or triggers the need for Enhanced Due Diligence (EDD).
38
What is a risk-based escalation?
A decision to accept, reject, or investigate a customer further based on risk level.
39
What should you do when a research gap is discovered?
Return to the Explore step to collect and verify more information.
40
What does organizing customer info help with?
It filters important data and prepares it for decision-making reports.
41
What decisions follow completion of due diligence?
Accept, reject, or do more research based on risk appetite.
42
What does a customer risk rating model help determine?
Whether the customer can be accepted, must be rejected, or needs more review.
43
What is residual risk in KYC?
The remaining risk after all controls and checks are applied.
44
What should happen when customer deposit patterns change?
Conduct ongoing due diligence and reassess risk.
45
What if customer behavior remains consistent?
Continue monitoring, but document and verify consistency to justify current risk rating.
46
Why is ongoing due diligence necessary?
To detect changes in behavior that may indicate risk or money laundering.
47
What’s a common KYC failure in high-volume environments?
Focusing on sales over compliance and skipping proper verification.
48
What can personal stories in case studies highlight?
How shortcuts in KYC can lead to compliance failures.
49
What is correspondent banking?
A relationship where one bank provides services to another in a jurisdiction where it lacks presence.
50
Why is correspondent banking high risk?
The correspondent bank doesn’t know the customers of the respondent bank.
51
What must banks assess before opening correspondent accounts?
Ownership, regulatory oversight, and risk level of the respondent bank.
52
What services might be offered to low-risk respondent banks?
Cash management, international transfers, foreign exchange, payable-through accounts.
53
How are high-risk respondent banks treated?
They may be restricted to non-credit, limited services.
54
What is a UBO (Ultimate Beneficial Owner)?
A person who benefits from or controls a legal entity, even if indirectly.
55
What happens if a UBO can't be identified?
Record senior managing officials as UBOs (U.S. and EU practice).
56
Why is hidden UBO information a red flag?
It may indicate attempts to conceal ownership for illegal purposes.
57
What does calculating beneficial ownership involve?
Tracing ownership across all parent companies to reach individuals.
58
What’s the risk of complex ownership structures?
They can hide the real owners and facilitate financial crime.
59
What is trade-based money laundering?
Using false pricing or invoices to disguise the movement of illicit funds through trade.
60
Why be cautious with websites making bold claims?
They may be scams or fronts for illegal activity if not backed by account behavior.
61
What kind of info should go into a KYC report?
Only relevant and risk-related information—filter out personal or unrelated details.
62
Why is filtering information important in KYC?
It ensures reports are focused, clear, and useful for compliance decisions.
63
What enhances the quality of risk assessment?
Using verified, relevant, and cross-checked information.
64
Why are gatekeepers considered high-risk?
They may hide the real customer behind complex structures, requiring more due diligence.
65
How do you know if you've done enough research?
When you've met your organization's standards and gathered sufficient risk-related info.
66
What should you do with customer data?
Store securely, share only with those who need to know, and follow privacy laws.
67
What is the 'Present' step in the KYC research model?
It's when you document, explain, and defend your findings and decisions.
68
What is your duty if financial crime is suspected?
Report it to the authorities following your organization’s defined policies.