Acams CCAS Exam Questions

Questions for the CCAS were updated on : Dec 01 ,2025

Page 1 out of 7. Viewing questions 1-15 out of 100

Question 1

Why should firms monitor “dusting” attacks?

  • A. They slow blockchain performance.
  • B. They can link anonymous wallets to known identities.
  • C. They increase transaction fees.
  • D. They inflate token supply.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Dusting involves sending tiny amounts of crypto to many addresses to later analyze transaction
patterns, potentially deanonymizing users — a privacy and AML concern.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which scenario most likely indicates active involvement of a customer in scam activities?

  • A. Indirect receiving from a scam cluster
  • B. Indirect sending to a scam cluster
  • C. Direct sending to a scam cluster
  • D. Direct receiving from a scam cluster
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Directly sending to a scam cluster is a strong indicator of active participation rather than passive
exposure, triggering SAR obligations.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

What is “hash rate” in blockchain?

  • A. The speed at which wallets are created.
  • B. The computational power used for mining.
  • C. The transaction fee rate.
  • D. The block size limit.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Hash rate measures computational power in Proof-of-Work blockchains; higher hash rates mean
more secure networks against 51% attacks.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which is a core component of customer due diligence (CDD)?

  • A. Transaction batching
  • B. Identity verification
  • C. Token staking
  • D. Node validation
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
CDD includes verifying the customer’s identity using reliable, independent documentation before or
during onboarding.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Which first step should a VASP take upon detecting repeated transactions to a high-risk wallet?

  • A. Immediately freeze the account.
  • B. Conduct internal investigation and enhanced due diligence.
  • C. Publicly disclose the wallet.
  • D. Notify all customers.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
EDD and internal review determine whether the activity is suspicious before regulatory reporting or
freezing actions.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which privacy-enhancing feature hides both the sender and receiver in a transaction?

  • A. Ring signatures
  • B. Multi-sig
  • C. Proof-of-Authority
  • D. Token swap
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Ring signatures, used in Monero, blend a sender’s transaction with others to obscure sender identity,
increasing AML risk.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which is an example of “structuring” in crypto transactions?

  • A. Sending multiple sub-threshold transactions to avoid reporting.
  • B. Exchanging one crypto for another.
  • C. Using a decentralized exchange.
  • D. Engaging in staking.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Structuring (smurfing) involves breaking transactions into smaller amounts to evade AML reporting
thresholds, a classic ML tactic.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

In sanctions screening, a “fuzzy match” occurs when:

  • A. There is no match found.
  • B. A partial or near match to a sanctions list entry occurs.
  • C. Only wallet addresses match exactly.
  • D. The customer is in a low-risk jurisdiction.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Fuzzy matches require further review to confirm whether the match is a true hit or a false positive,
ensuring compliance accuracy.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

What is a “smart contract”?

  • A. A legal agreement stored offline.
  • B. A self-executing code stored on blockchain.
  • C. A compliance monitoring tool.
  • D. A cold storage wallet type.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Smart contracts execute predetermined conditions automatically on blockchain, enabling
decentralized applications and services.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

A politically exposed person (PEP) opens a crypto account. What is the required action?

  • A. Treat as standard customer.
  • B. Apply EDD and senior management approval.
  • C. Decline onboarding.
  • D. Request a travel rule exemption.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
PEPs require enhanced scrutiny under FATF Recommendation 12, including senior management
approval and source of funds verification.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which governance function is ultimately responsible for approving AML/CFT policies?

  • A. MLRO
  • B. Board of Directors
  • C. Compliance officer
  • D. Chief Executive Officer
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
The Board holds ultimate responsibility for policy approval under DFSA and FSRA AML rules, ensuring
senior-level oversight.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which is a primary benefit of blockchain transparency for AML compliance?

  • A. Real-time price tracking
  • B. Ability to trace historical transactions
  • C. Reducing market volatility
  • D. Automatic sanctions screening
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Blockchain’s transparent ledger enables investigators to trace transaction histories indefinitely,
aiding ML/TF detection.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Under FATF guidance, “unhosted wallets” are:

  • A. Wallets managed by regulated exchanges.
  • B. Wallets where users control private keys directly.
  • C. Custodial wallets held by third parties.
  • D. Wallets with multi-sig security.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Unhosted wallets are self-custody wallets controlled directly by the user without third-party
oversight, posing higher anonymity and AML risks.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which type of blockchain is jointly operated by multiple pre-approved organizations?

  • A. Public
  • B. Consortium
  • C. Private
  • D. Hybrid
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Consortium blockchains are semi-private networks where governance is shared among authorized
participants, offering a balance between decentralization and access control.

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Which metric is most relevant for assessing liquidity risk in a cryptoasset exchange?

  • A. Number of listed tokens
  • B. Order book depth and spread
  • C. Blockchain confirmation times
  • D. Wallet address count
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Explanation:
Liquidity risk assessment focuses on the ability to execute trades without large price swings, which is
reflected in order book depth and bid-ask spreads.

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2