ACAMS CKYCA Exam (page: 2)
ACAMS Certified Know Your Customer Associate
Updated on: 11-Dec-2025

Viewing Page 2 of 9

In which circumstance must a KYC analyst obtain source of wealth information on a client subject to CDD?

  1. Information on source of wealth for CDD clients must always be collected.
  2. The client is establishing a business relationship with a private company whose benefit surpasses 10 million USD.
  3. The client's senior manager is deemed to be an ultimate beneficial owner.
  4. The number of business relationships involving high-risk third countries or politically exposed persons increases.

Answer(s): D

Explanation:

FATF requires obtaining and verifying source of wealth information in higher-risk situations, such as when there is increased involvement with high-risk jurisdictions or Politically Exposed Persons (PEPs), as part of enhanced due diligence.



Customers opening accounts online identify their occupation from a drop-down list. A KYC analyst notices a high volume of applicants selecting "Accountant" because itis at the top of the list. The institution's KYC policy does not require evidence to verify occupation.

Which is the most appropriate action for the KYC analyst to take?

  1. Do not take further action because occupation verification is not required.
  2. Make a note in the KYC file to confirm if any unusual activity is identified.
  3. Cancel the applications in the system and instruct customers to read the entire list before selecting.
  4. Escalate to the KYC manager for guidance.

Answer(s): D

Explanation:

A sudden pattern in occupation selection can indicate inaccurate self-reporting or potential misuse of the onboarding process. Even if policy does not require occupation verification, such anomalies should be escalated to the KYC manager for review and potential policy or process adjustments.



Which situation would most likely increase the inherent risk of a corporate customer?

  1. A junior-level employee of the customer becomes politically exposed.
  2. The customer opens an additional cash management account.
  3. A beneficial owner of the customer goes public on a US stock exchange.
  4. The customer's business expands beyond its home country.

Answer(s): D

Explanation:

Expanding business operations beyond the home country increases inherent risk due to cross-border transactions, exposure to multiple jurisdictions, and potential dealings with regions of higher money laundering or terrorism financing risk.



A compliance officer in an international bank is reviewing new customer onboarding files. The relationship manager provides a whole set of customer documents, in addition to information from open source research.
What information should be used by the compliance officer as secondary documentation to verify the primary documentation?

  1. A phone bill, utility bill, or bank statement showing the name and address of the customer, issued less than 3 months ago
  2. Government-issued documents such as an identification card, passport, or driving license, issued more than 1 year ago
  3. Government-issued documents such as an identification card, passport, or driving license, issued less than 3 months ago
  4. A phone bill, utility bill, or bank statement showing the name and address of the customer, issued more than 1 year ago

Answer(s): A

Explanation:

Secondary documentation for verification purposes should be recent, reliable, and issued by a trusted source. Utility bills, phone bills, or bank statements issued within the last three months are commonly accepted to confirm address and identity details provided in primary documentation.



Sanctions screening is important before onboarding a customer, or when using the services of a financial institution, because it:

  1. helps identify customers that are politically exposed persons.
  2. always leads to a suspicious activity report.
  3. helps to identify a potential match to a sanctioned party or location.
  4. detects all possible sanctions risk exposure.

Answer(s): C

Explanation:

Sanctions screening is conducted to detect whether a customer or related party is on a sanctions list or linked to a sanctioned location, ensuring compliance with legal and regulatory requirements before establishing or continuing a business relationship.



Which is the best technique to effectively document a customer profile?

  1. Have the profile start with a picture of the customer followed by key numbers, such as expected turnover.
  2. Record customer information using abbreviations, explain adjectives, and provide a narrative to follow.
  3. Document customer information in a standardized way that is defined by the customer's jurisdiction
  4. Avoid adjectives and exaggerations, put the information into context, and be precise and unambiguous

Answer(s): D

Explanation:

Effective customer profile documentation should be clear, precise, and free from subjective language. Providing context and avoiding ambiguity ensures the information is reliable, verifiable, and usable for risk assessment and compliance purposes.



A KYC analyst is running an adverse media search on a prospective client's directors and learns that one of the directors has been accused of receiving bribery payments.
Which step should the KYC analyst take next?

  1. Refuse to establish a business relationship with the client.
  2. Escalate the matter to the compliance team.
  3. Ask the director for an explanation.
  4. Dismiss the finding as immaterial.

Answer(s): B

Explanation:

Allegations of bribery involving a director are a significant red flag for potential financial crime risk. The KYC analyst should escalate the finding to the compliance team for assessment and guidance before making any decision on the business relationship.



A bank's business team has developed a new strategy, which includes the introduction of prepaid cards as a new high-risk product offering. The compliance team has proposed to impose a monetary limit on each prepaid card and limit the offering to the existing customers of the bank only.
Which best describes the risk impact of the controls proposed by the compliance team?

  1. Inherent risk will increase
  2. Residual risk will decrease.
  3. Inherent risk will decrease.
  4. Residual risk will increase.

Answer(s): B

Explanation:

Inherent risk is the natural risk before controls are applied. The compliance team's measures (monetary limits and restricting to existing customers) reduce the exposure to misuse, thereby lowering the residual risk - the risk that remains after controls are implemented.



Viewing Page 2 of 9



Share your comments for ACAMS CKYCA exam with other users:

Sale Danasabe 10/24/2023 5:21:00 PM

the question are kind of tricky of you didnt get the hnag on it.
Anonymous


Luis 11/16/2023 1:39:00 PM

can anyone tell me if this is for rhel8 or rhel9?
UNITED STATES


hik 1/19/2024 1:47:00 PM

good content
UNITED STATES


Blessious Phiri 8/15/2023 2:18:00 PM

pdb and cdb are critical to the database
Anonymous


Zuned 10/22/2023 4:39:00 AM

till 104 questions are free, lets see how it helps me in my exam today.
UNITED STATES


Muhammad Rawish Siddiqui 12/3/2023 12:11:00 PM

question # 56, answer is true not false.
SAUDI ARABIA


Amaresh Vashishtha 8/27/2023 1:33:00 AM

i would be requiring dumps to prepare for certification exam
Anonymous


Asad 9/8/2023 1:01:00 AM

very helpful
PAKISTAN


Blessious Phiri 8/13/2023 3:10:00 PM

control file is the heart of rman backup
Anonymous


Senthil 9/19/2023 5:47:00 AM

hi could you please upload the ibm c2090-543 dumps
Anonymous


Harry 6/27/2023 7:20:00 AM

appriciate if you could upload this again
AUSTRALIA


Anonymous 7/10/2023 4:10:00 AM

please upload the dump
SWEDEN


Raja 6/20/2023 5:30:00 AM

i found some questions answers mismatch with explanation answers. please properly update
UNITED STATES


Doora 11/30/2023 4:20:00 AM

nothing to mention
Anonymous


deally 1/19/2024 3:41:00 PM

knowable questions
UNITED STATES


Sonia 7/23/2023 4:03:00 PM

very helpfull
UNITED STATES


binEY 10/6/2023 5:15:00 AM

good questions
Anonymous


Neha 9/28/2023 1:58:00 PM

its helpful
Anonymous


Desmond 1/5/2023 9:11:00 PM

i just took my oracle exam and let me tell you, this exam dumps was a lifesaver! without them, iam not sure i would have passed. the questions were tricky and the answers were obscure, but the exam dumps had everything i needed. i would recommend to anyone looking to pass their oracle exams with flying colors (and a little bit of cheating) lol.
SINGAPORE


Davidson OZ 9/9/2023 6:37:00 PM

22. if you need to make sure that one computer in your hot-spot network can access the internet without hot-spot authentication, which menu allows you to do this? answer is ip binding and not wall garden. wall garden allows specified websites to be accessed with users authentication to the hotspot
Anonymous


381 9/2/2023 4:31:00 PM

is question 1 correct?
Anonymous


Laurent 10/6/2023 5:09:00 PM

good content
Anonymous


Sniper69 5/9/2022 11:04:00 PM

manged to pass the exam with this exam dumps.
UNITED STATES


Deepak 12/27/2023 2:37:00 AM

good questions
SINGAPORE


dba 9/23/2023 3:10:00 AM

can we please have the latest exam questions?
Anonymous


Prasad 9/29/2023 7:27:00 AM

please help with jn0-649 latest dumps
HONG KONG


GTI9982 7/31/2023 10:15:00 PM

please i need this dump. thanks
CANADA


Elton Riva 12/12/2023 8:20:00 PM

i have to take the aws certified developer - associate dva-c02 in the next few weeks and i wanted to know if the questions on your website are the same as the official exam.
Anonymous


Berihun Desalegn Wonde 7/13/2023 11:00:00 AM

all questions are more important
Anonymous


gr 7/2/2023 7:03:00 AM

ques 4 answer should be c ie automatically recover from failure
Anonymous


RS 7/27/2023 7:17:00 AM

very very useful page
INDIA


Blessious Phiri 8/12/2023 11:47:00 AM

the exams are giving me an eye opener
Anonymous


AD 10/22/2023 9:08:00 AM

3rd so far, need to cover more
Anonymous


Matt 11/18/2023 2:32:00 AM

aligns with the pecd notes
Anonymous