Which type of cryptoasset is explicitly designed to maintain a stable value?
Stablecoins aim to maintain value stability by pegging to assets like fiat currency or commodities. Regulators stress monitoring stablecoin reserve transparency to prevent misuse for layering illicit funds.
Which activity should be detected as a red flag during the customer onboarding stage and further investigated?
Sharing of the same IP address by multiple customers during onboarding can indicate potential fraud, identity manipulation, or collusion, and should be flagged for further investigation. This can be a sign of synthetic identities or multiple accounts controlled by the same person.
Receipt of law enforcement requests (A) usually occurs post-onboarding, while the location (B) or use of foreign IDs (C) is not inherently suspicious.
Which advantage of the proof of work consensus algorithm is widely applicable in many cryptocurrencies and other blockchain systems?
Proof of Work (PoW) consensus achieves network consensus by requiring participants (miners) to solve complex cryptographic puzzles, which verifies transactions and secures the blockchain. This computational work makes it difficult and costly to alter the blockchain.
Dependency on electricity (A) is a criticism rather than an advantage. PoW promotes decentralization rather than centralization (B). It provides strong security for large networks rather than small ones (D).
This principle is fundamental in Bitcoin and many other cryptocurrencies and is frequently referenced in AML/CFT guidance to understand the transaction validation process and network security.
Misconfigured smart contracts can allow which type of scam to occur?
Misconfigured or poorly designed smart contracts can enable rug pull scams, where developers create fraudulent decentralized finance (DeFi) projects or tokens and then withdraw liquidity or funds abruptly, leaving investors with worthless assets.
Phishing (A) and SIM attacks (B) relate to social engineering and telecom fraud, respectively, and ransomware (D) is malware demanding payment. Rug pulls specifically exploit smart contract vulnerabilities.
The DFSA and AML thematic reviews on crypto highlight rug pull scams as a key operational and financial crime risk linked to smart contract vulnerabilities.
A customer sends funds to multiple newly created wallets before cashing out via an exchange. This is an example of:
This process is layering, designed to hide the source of funds through multiple new wallets before integration into the financial system.
Currently there are no comments in this discussion, be the first to comment!