Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Acams Exam CAMS-FCI Topic 2 Question 17 Discussion

Actual exam question for Acams's CAMS-FCI exam
Question #: 17
Topic #: 2
[All CAMS-FCI Questions]

An investigator is reviewing an alert for unusual activity. System scanning detected a text string within a company customer's account transactions that indicates the account may have been used for a drug or drug paraphernalia purchase Based on the KYC profile, the investigator determines the customer's company name and business type are marketed as a gardening supplies company. The investigator reviews the account activity and notes an online purchase transaction that leads the investigator to a website that sells various strains of marijuan

a. Additional account review detects cash deposits into the account at the branch teller lines, so the investigator reaches out to the teller staff regarding the transactions. The teller staff member reports that the business customers have frequently deposited cash in lower amounts. The teller, without prompting, adds that one of the transactors would occasionally smell of a distinct scent of marijuana smoke.

Which are the best next steps for the investigator to take? (Select Three.)

Show Suggested Answer Hide Answer
Suggested Answer: A, C, E

The best next steps for the investigator to take are:

A . Review the customer's transaction history. This can help the investigator identify any patterns or anomalies in the customer's account activity, such as changes in transaction volume, frequency, amount, source, destination, purpose, etc. The investigator can also compare the customer's transaction history with their KYC profile and risk rating to assess if there are any discrepancies or inconsistencies.

C . Check internal KYC information. This can help the investigator verify the customer's identity, business nature, ownership structure, expected activity, source of funds, etc. The investigator can also update or enhance the customer's KYC information based on any new or relevant information obtained from other sources.

E Conduct adverse media and open-source searches on the customer's background. This can help the investigator find out if there is any negative or adverse information about the customer in public data sources, such as news articles, social media posts, blogs, forums, etc. Adverse media and open-source searches can also provide additional context and insight into the customer's reputation, behavior, associations, etc. The other options are incorrect because:

B . Request information from the internet service provider who hosts the website is not feasible, as it may require a legal process or a court order to obtain such information. Moreover, the internet service provider may not have or disclose any useful information about the website or its owner.

D . Research other customer accounts for transactions to the same website is not relevant, as it may not provide any meaningful information about the customer under investigation. Furthermore, it may violate the privacy and confidentiality of other customers who are not related to the investigation.

F . Identify if the customer has opened accounts in an urban city area is not helpful, as it may not have any bearing on the customer's involvement in a drug or drug paraphernalia purchase. Additionally, it may not be possible to access or verify such information without the customer's consent or authorization.


Advanced CAMS-FCI Certification | ACAMS, Section 2: Investigating Financial Crimes, page 11

Leading Complex Investigations Certificate | ACAMS, Module 3: Conducting Research and Analysis, page 6

Adverse Media Screening - Using AI to Mitigate Risk

Legal requirements for adverse media screening - Thomson Reuters

Electronic client due diligence | Ethics helpsheets | ICAEW

6AMLD & FATF: Where Adverse Media Screening Fits In

Free Adverse Media Check | NameScan

Contribute your Thoughts:

Dannette
7 days ago
I agree with Sheron. The investigator needs to dig deeper and not just rely on the internal information. Checking the website and seeing if the customer has any other suspicious transactions is key.
upvoted 0 times
...
Cathrine
19 days ago
I think conducting adverse media and open-source searches on the customer's background is also important.
upvoted 0 times
...
Tina
20 days ago
I agree with Laura. Checking the transaction history can provide valuable insights.
upvoted 0 times
...
Sheron
1 months ago
Hmm, I think B, D, and E are the best next steps. Gathering more information from external sources and checking for any patterns or connections in the customer's activities is crucial.
upvoted 0 times
Dalene
6 days ago
E) Conduct adverse media and open-source searches on the customer's background.
upvoted 0 times
...
Delila
24 days ago
D) Research other customer accounts for transactions to the same website.
upvoted 0 times
...
Carissa
25 days ago
B) Request information from the internet service provider who hosts the website.
upvoted 0 times
...
...
Laura
1 months ago
I think the investigator should review the customer's transaction history first.
upvoted 0 times
...

Save Cancel