ACAMS CAMS-FCI Exam (page: 1)
ACAMS Advanced CAMS-Financial Crimes Investigations
Updated on: 24-Mar-2026

Viewing Page 1 of 14

The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department. As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
After further review, the decision is made that transactions appear suspicious.
Which are the next steps the investigator should take? (Select Two.)

  1. Close the customer's accounts since the FIU is issuing a warrant to freeze the funds.
  2. Contact local LE and advise them of the investigation details to help speed up the investigation and prosecution.
  3. Provide additional information to the LE upon receiving a formal request.
  4. Close the investigation as the FIU is already on this matter, and they will inform LE if needed.
  5. Gather all the information that would be useful for law enforcement (LE) and recommend filing a SAR/STR

Answer(s): C,E

Explanation:

The correct answer is C and E. The investigator should provide additional information to the LE upon receiving a formal request, and gather all the information that would be useful for LE and recommend filing a SAR/STR. These steps are consistent with the best practices of conducting financial crime investigations and reporting suspicious activity. The investigator should not close the customer's accounts or the investigation, as this may interfere with the ongoing LE inquiry and violate the FI's policies and procedures. The investigator should also not contact local LE directly, as this may compromise the confidentiality of the investigation and the FIU's authority.


Reference:

Advanced CAMS-FCI Study Guide, Chapter 4: Reporting Suspicious Activity, pages 40-411 Advanced CAMS-FCI Study Guide, Chapter 5: Governance of an AFC Investigations Unit, pages 48-491
Advanced CAMS-FCI Certification | ACAMS



The investigative department of a financial institution (Fl) receives an internal escalation notice from the remittance department for a SWIFT message requesting a refund due to potential fraud. The notice indicates that a total of three international incoming remittances were transferred to a corporate customer from Country A, in the amount of approximately 5 million EUR for each. The first two incoming remittances had been exchanged into currency B and transferred out to Country B a few days ago. The third incoming remittance has been held by the remittance department. As noted from the KYC profile, the corporate customer is working in the wood industry. with the last account review completed 3 months ago. Since the account's opening. there has been no history of a large amount of funds flowing through the account. The investigator conducts an Internet search and finds that the remitter is a food beverage company.
The same morning, the investigator receives a call from a financial intelligence unit (FIU) inquiring about the same incident. The FIU states that it will issue a warrant to freeze the account on the same day.
Which steps for documenting the final investigation decision are appropriate for the investigator in this scenario?

  1. Exclude any open-source information from record-keeping since it is publicly available.
  2. Add all of the information the Fl has about the subject, their account(s) activity, research results.
    KYC information, etc. to the SAR/STR.
  3. Document the investigation process and retain all relevant documents in the case management system.
  4. Do not document the investigation process if a SAR/STR is not filed.

Answer(s): C

Explanation:

The investigator should document the investigation process and retain all relevant documents in the case management system. This is because documenting the investigation process is a good practice to ensure the quality and consistency of the investigation, as well as to facilitate the review and audit of the investigation. Retaining all relevant documents is also important to support the evidence and findings of the investigation, as well as to comply with the record-keeping requirements of the relevant authorities. The other options are incorrect because:
A . Excluding any open-source information from record-keeping is not advisable, as open-source information can provide valuable insights and context for the investigation, and may not be easily retrievable in the future.
B . Adding all of the information the FI has about the subject, their account(s) activity, research results, KYC information, etc. to the SAR/STR is not necessary, as the SAR/STR should only contain the essential information that is relevant and material to the suspicious activity. Adding too much information may obscure the main points and make the SAR/STR less effective. D . Not documenting the investigation process if a SAR/STR is not filed is not acceptable, as the investigation process should be documented regardless of the outcome. Documenting the investigation process can help justify why a SAR/STR was not filed, and also provide a reference for future investigations involving the same subject or activity.


Reference:

Advanced CAMS-FCI Certification | ACAMS, Section 3: Reporting Suspicious Activity, page 14 Leading Complex Investigations Certificate | ACAMS, Module 4: Documenting Your Investigation, page 4



Refer to the exhibit.



In a review of the account activity associated with Nadine Kien, an investigator observes a large number of small- to medium-size deposits from numerous individuals from several different global regions. The money is then transferred to a numbered company.
Which is the next best course of action for the investigator?

  1. Complete the monthly review and note the activity for next month's review.
  2. File a SAR/STR on the account activity in relation to a potential funnel account.
  3. Recommend the account for exit due to frequent global transactions.
  4. No further action is required as the customer is already rated at high-risk and the monthly spending is within expectations.

Answer(s): B

Explanation:

The next best course of action for the investigator is to file a SAR/STR on the account activity in relation to a potential funnel account. This is because a funnel account is a type of money laundering scheme that involves depositing funds from multiple sources into a single account, and then transferring them to another account, often in a different jurisdiction. A funnel account can be used to conceal the origin, ownership, and destination of illicit funds, and to evade currency transaction reporting requirements. The investigator should report the suspicious activity to the relevant authorities and document the findings and actions taken. The other options are incorrect because:

A . Completing the monthly review and noting the activity for next month's review is not sufficient, as it delays the reporting of a possible money laundering scheme and exposes the financial institution to regulatory and reputational risks.
C . Recommending the account for exit due to frequent global transactions is not appropriate, as it does not address the underlying issue of potential money laundering and may alert the customer of the investigation.
D . No further action is required as the customer is already rated at high-risk and the monthly spending is within expectations is not acceptable, as it ignores the red flags of a funnel account and fails to comply with the anti-money laundering obligations of the financial institution.


Reference:

Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 9 Leading Complex Investigations Certificate | ACAMS, Module 2: Identifying Red Flags, page 5



Refer to the exhibit.



During a review of the accounts related to Richard Aston, an investigator notices a high number of incoming payments from various individuals. They also notice that these incoming payments typically occur during large sporting events or conferences. As a result of the account review, of which illegal activity does the investigator have reasonable grounds to suspect Richard Aston?

  1. Embezzling from the hotel
  2. Aftermarket sales of entertainment admission tickets
  3. Human trafficking
  4. Sports betting

Answer(s): B

Explanation:

The illegal activity that the investigator has reasonable grounds to suspect Richard Aston of is aftermarket sales of entertainment admission tickets. This is because aftermarket sales of entertainment admission tickets involve reselling tickets for events, concerts, festivals, etc. at a higher price than their face value, often through online platforms or scalpers. This practice can be illegal or unethical, depending on the jurisdiction and the terms and conditions of the original ticket seller. The investigator should look for indicators of aftermarket sales of entertainment admission tickets, such as high volume or frequency of incoming payments from various individuals, correlation between incoming payments and major events or conferences, and discrepancy between the customer's profile and the nature of the transactions. The other options are incorrect because:

A . Embezzling from the hotel is not likely, as it would involve stealing money or property from the hotel by an employee or a person in a position of trust. There is no evidence that Richard Aston works for or has access to the hotel's assets.
C . Human trafficking is not probable, as it would involve exploiting people for forced labor or commercial sexual exploitation. There is no indication that Richard Aston is involved in any form of human trafficking or has any connection to victims or perpetrators. D . Sports betting is not plausible, as it would involve wagering money on the outcome of sporting events or games. There is no sign that Richard Aston is engaged in any sports betting activity or has any association with bookmakers or gamblers.


Reference:

Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 10 TicketSwap: The safest way to buy and sell tickets
Ticketing 101 | Ticketmaster
10 Types of Tickets For Events (+ Why & When To Use Them) - Eventbrite



An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuana. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which are the best next steps for the investigator to take? (Select Three.)

  1. Review the customer's transaction history.
  2. Request information from the internet service provider who hosts the website.
  3. Check internal KYC information.
  4. Research other customer accounts for transactions to the same website.
  5. Conduct adverse media and open-source searches on the customer's background.
  6. Identify if the customer has opened accounts in an urban city area.

Answer(s): A,C,E

Explanation:

The best next steps for the investigator to take are:

A . Review the customer's transaction history. This can help the investigator identify any patterns or anomalies in the customer's account activity, such as changes in transaction volume, frequency, amount, source, destination, purpose, etc. The investigator can also compare the customer's transaction history with their KYC profile and risk rating to assess if there are any discrepancies or inconsistencies.
C . Check internal KYC information. This can help the investigator verify the customer's identity, business nature, ownership structure, expected activity, source of funds, etc. The investigator can also update or enhance the customer's KYC information based on any new or relevant information obtained from other sources.
E Conduct adverse media and open-source searches on the customer's background. This can help the investigator find out if there is any negative or adverse information about the customer in public data sources, such as news articles, social media posts, blogs, forums, etc. Adverse media and open- source searches can also provide additional context and insight into the customer's reputation, behavior, associations, etc. The other options are incorrect because:
B . Request information from the internet service provider who hosts the website is not feasible, as it may require a legal process or a court order to obtain such information. Moreover, the internet service provider may not have or disclose any useful information about the website or its owner. D . Research other customer accounts for transactions to the same website is not relevant, as it may not provide any meaningful information about the customer under investigation. Furthermore, it may violate the privacy and confidentiality of other customers who are not related to the investigation.
F . Identify if the customer has opened accounts in an urban city area is not helpful, as it may not have any bearing on the customer's involvement in a drug or drug paraphernalia purchase. Additionally, it may not be possible to access or verify such information without the customer's consent or authorization.


Reference:

Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 11 Leading Complex Investigations Certificate | ACAMS, Module 3: Conducting Research and Analysis, page 6
Adverse Media Screening - Using AI to Mitigate Risk
Legal requirements for adverse media screening - Thomson Reuters Electronic client due diligence | Ethics helpsheets | ICAEW 6AMLD & FATF: Where Adverse Media Screening Fits In
Free Adverse Media Check | NameScan



An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase. Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuana. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.
Which information should be included in the SAR/STR?

  1. The customer information, including KYC background
  2. A transaction that is commensurate with the customer's background
  3. The fact that one of the transactors occasionally smelled of marijuana smoke
  4. Details of the transactor's social media accounts

Answer(s): C

Explanation:

The SAR/STR should include any information that is relevant to the suspicious activity, such as the customer information, the transaction details, and any other indicators of potential money laundering or criminal activity. The fact that one of the transactors occasionally smelled of marijuana smoke is an indicator that the customer may be involved in the illicit drug trade, which is a predicate offense for money laundering. Therefore, this information should be included in the SAR/STR.


Reference:

Advanced CAMS-FCI Study Guide, page 25.



A financial institution (Fl) banks a money transmitter business (MTB) located in Miami. The MTB regularly initiates wire transfers with the ultimate beneficiary in Cuba and legally sells travel packages to Cuba. The wire transfers for money remittances comply with the country's economic sanctions policies. A Fl investigator on the sanctions team reviews each wire transfer to ensure compliance with sanctions and to monitor transfer details.
An airline located in Cuba, unrelated to the business, legally sells airline tickets in Cuba to Cuban citizens wanting to travel outside of Cuba. The airline tickets are purchased using Cuban currency (CUC).
The MTB wants 100,000 USD worth of CUC. Purchasing CUC from a Cuban bank includes a 4% fee.
The MTB contacts the airline to ask if the airline will trade its CUC for USD at a lower exchange fee than the Cuban bank. The airline agrees to a 1% fee. The MTB initiates a wire transfer to the airline which appears as normal activity in the monitoring system because of the business' travel package sales.

Which investigative actions should the investigator take concerning the 100.000 USD wire transfer? (Select Three.)

  1. Review the wire transfer protocols for this customer.
  2. Gather all account activity for Fl clients that purchased packages from the airline.
  3. Review a sampling of wire transfers initiated by travel companies with Cuba travel packages.
  4. Recommend a plan for the Fl's management to restrict the account relationship.
  5. Review regulations applicable to foreign currency trading transactions.
  6. Locate and review licenses, registrations, and account operating agreements associated with the MTB account.

Answer(s): A,E,F

Explanation:

The investigator should take the following investigative actions concerning the 100,000 USD wire transfer:

Review the wire transfer protocols for this customer. This will help the investigator to determine if the wire transfer is consistent with the customer's normal business activity and risk profile, or if it deviates from the established patterns or thresholds.
Review regulations applicable to foreign currency trading transactions. This will help the investigator to assess if the wire transfer violates any laws or regulations related to currency exchange, such as reporting requirements, licensing requirements, or sanctions compliance. Locate and review licenses, registrations, and account operating agreements associated with the MTB account. This will help the investigator to verify if the MTB has the necessary authorization and documentation to conduct currency exchange transactions and if it has disclosed this activity to the FI.


Reference:

Advanced CAMS-FCI Study Guide, pages 32-33.



A financial institution (Fl) banks a money transmitter business (MTB) located in Miami. The MTB regularly initiates wire transfers with the ultimate beneficiary in Cuba and legally sells travel packages to Cuba. The wire transfers for money remittances comply with the country's economic sanctions policies. A Fl investigator on the sanctions team reviews each wire transfer to ensure compliance with sanctions and to monitor transfer details.
An airline located in Cuba, unrelated to the business, legally sells airline tickets in Cuba to Cuban citizens wanting to travel outside of Cuba. The airline tickets are purchased using Cuban currency (CUC).
The MTB wants 100,000 USD worth of CUC . Purchasing CUC from a Cuban bank includes a 4% fee.
The MTB contacts the airline to ask if the airline will trade its CUC for USD at a lower exchange fee than the Cuban bank. The airline agrees to a 1% fee. The MTB initiates a wire transfer to the airline which appears as normal activity in the monitoring system because of the business' travel package sales.
The investigator recommends that a SAR/STR be filed.

What documentation should be referenced in the SAR/STR filing? (Select Three.)

  1. All documents related to the agreement between the airline and the MTB
  2. Cumulative dollar amount of the wire transfer activity
  3. Airline's ticket sales and passenger list
  4. regarding travel packages
  5. Licensing information regarding the travel agency providing tourist sales to Cuba
  6. Account documentation on all related accounts maintained by the MTB

Answer(s): B

Explanation:

The most likely reason for conducting a reverse transaction is to conceal or launder illicit funds. A reverse transaction is a transaction that reverses a previous transaction, such as a refund, a chargeback, or a cancellation. Reverse transactions can be used by money launderers to obscure the source, ownership, or destination of funds, or to create false records or invoices. For example, a money launderer may initiate a wire transfer from a high-risk jurisdiction to a low-risk jurisdiction, and then reverse the transaction after receiving confirmation of the funds. This way, the money launderer can create a paper trail that shows legitimate funds coming from a low-risk jurisdiction, while hiding the true origin of the funds.


Reference:

Advanced CAMS-FCI Study Guide, page 40-41.



Viewing Page 1 of 14



Share your comments for ACAMS CAMS-FCI exam with other users:

Neha 9/28/2023 1:58:00 PM

its helpful
Anonymous


Desmond 1/5/2023 9:11:00 PM

i just took my oracle exam and let me tell you, this exam dumps was a lifesaver! without them, iam not sure i would have passed. the questions were tricky and the answers were obscure, but the exam dumps had everything i needed. i would recommend to anyone looking to pass their oracle exams with flying colors (and a little bit of cheating) lol.
SINGAPORE


Davidson OZ 9/9/2023 6:37:00 PM

22. if you need to make sure that one computer in your hot-spot network can access the internet without hot-spot authentication, which menu allows you to do this? answer is ip binding and not wall garden. wall garden allows specified websites to be accessed with users authentication to the hotspot
Anonymous


381 9/2/2023 4:31:00 PM

is question 1 correct?
Anonymous


Laurent 10/6/2023 5:09:00 PM

good content
Anonymous


Sniper69 5/9/2022 11:04:00 PM

manged to pass the exam with this exam dumps.
UNITED STATES


Deepak 12/27/2023 2:37:00 AM

good questions
SINGAPORE


dba 9/23/2023 3:10:00 AM

can we please have the latest exam questions?
Anonymous


Prasad 9/29/2023 7:27:00 AM

please help with jn0-649 latest dumps
HONG KONG


GTI9982 7/31/2023 10:15:00 PM

please i need this dump. thanks
CANADA


Elton Riva 12/12/2023 8:20:00 PM

i have to take the aws certified developer - associate dva-c02 in the next few weeks and i wanted to know if the questions on your website are the same as the official exam.
Anonymous


Berihun Desalegn Wonde 7/13/2023 11:00:00 AM

all questions are more important
Anonymous


gr 7/2/2023 7:03:00 AM

ques 4 answer should be c ie automatically recover from failure
Anonymous


RS 7/27/2023 7:17:00 AM

very very useful page
INDIA


Blessious Phiri 8/12/2023 11:47:00 AM

the exams are giving me an eye opener
Anonymous


AD 10/22/2023 9:08:00 AM

3rd so far, need to cover more
Anonymous


Matt 11/18/2023 2:32:00 AM

aligns with the pecd notes
Anonymous


Sri 10/15/2023 4:38:00 PM

question 4: b securityadmin is the correct answer. https://docs.snowflake.com/en/user-guide/security-access-control-overview#access-control-framework
GERMANY


H.T.M. D 6/25/2023 2:55:00 PM

kindly please share dumps
Anonymous


Satish 11/6/2023 4:27:00 AM

it is very useful, thank you
Anonymous


Chinna 7/30/2023 8:37:00 AM

need safe rte dumps
FRANCE


1234 6/30/2023 3:40:00 AM

can you upload the cis - cpg dumps
Anonymous


Did 1/12/2024 3:01:00 AM

q6 = 1. download odt application 2. create a configuration file (xml) 3. setup.exe /download to download the installation files 4. setup.exe /configure to deploy the application
FRANCE


John 10/12/2023 12:30:00 PM

great material
Anonymous


Dinesh 8/1/2023 2:26:00 PM

could you please upload sap c_arsor_2302 questions? it will be very much helpful.
Anonymous


LBert 6/19/2023 10:23:00 AM

vraag 20c: rsa veilig voor symmtrische cryptografie? antwoord c is toch fout. rsa is voor asymmetrische cryptogafie??
NETHERLANDS


g 12/22/2023 1:51:00 PM

so far good
UNITED STATES


Milos 8/4/2023 9:33:00 AM

question 31 has obviously wrong answers. tls and ssl are used to encrypt data at transit, not at rest.
Serbia And Montenegro


Diksha 9/25/2023 2:32:00 AM

pls provide dump for 1z0-1080-23 planning exams
Anonymous


H 7/17/2023 4:28:00 AM

could you please upload the exam?
Anonymous


Anonymous 9/14/2023 4:47:00 AM

please upload this
UNITED STATES


Naveena 1/13/2024 9:55:00 AM

good material
Anonymous


WildWilly 1/19/2024 10:43:00 AM

lets see if this is good stuff...
Anonymous


Lavanya 11/2/2023 1:53:00 AM

useful information
UNITED STATES