Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
CMFAS MODULE 5 English Full Access
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
What is an international organisation?
I. An entity established by formal political agreements between member countries that have the status of international treaties.
II. An entity whose existence is recognised by law in member countries.
III. An entity which is not treated as a resident institutional unit of the country in which it is located.
IV. An entity which is treated as a resident institutional unit of the country in which it is located.
Correct
“International organisation” means an entity established by formal political agreements between member countries that have the status of international treaties, whose existence is recognised by law in member countries and which is not treated as a resident institutional unit of the country in which it is located;
Incorrect
“International organisation” means an entity established by formal political agreements between member countries that have the status of international treaties, whose existence is recognised by law in member countries and which is not treated as a resident institutional unit of the country in which it is located;
-
Question 2 of 30
2. Question
Which is not a prominent public function?
Correct
“Prominent public functions” includes the roles held by a head of state, a head of government, government ministers, senior civil or public servants,senior judicial or military officials, senior executives of state owned corporations, senior political party officials, members of the legislature and senior management of international organisations.
Incorrect
“Prominent public functions” includes the roles held by a head of state, a head of government, government ministers, senior civil or public servants,senior judicial or military officials, senior executives of state owned corporations, senior political party officials, members of the legislature and senior management of international organisations.
-
Question 3 of 30
3. Question
When can a financial adviser rely on third party to perform the measures?
I. The financial adviser is satisfied that the third party it intends to rely upon is subject to and supervised for compliance with AML/CFT requirements.
II. The financial adviser takes appropriate steps to identify, assess and understand the money laundering and terrorism financing risks.
III. The third party is not one which financial advisers have been specifically precluded by the Authority from relying upon.
IV. The third party is able and willing to provide, without delay, upon the financial adviser’s request, any data, documents or information obtained by it.
Correct
A financial adviser may rely on a third party to perform the measures if the following requirements are met:
(a) the financial adviser is satisfied that the third party it intends to rely upon is subject to and supervised for compliance with AML/CFT requirements consistent with standards set by the FATF, and has adequate AML/CFT measures in place to comply with those requirements;
(b) the financial adviser takes appropriate steps to identify, assess and understand the money laundering and terrorism financing risks particular to the countries or jurisdictions that the third party operates in;
(c) the third party is not one which financial advisers have been specifically precluded by the Authority from relying upon; and
(d) the third party is able and willing to provide, without delay, upon the financial adviser’s request, any data, documents or information obtained by the third partyIncorrect
A financial adviser may rely on a third party to perform the measures if the following requirements are met:
(a) the financial adviser is satisfied that the third party it intends to rely upon is subject to and supervised for compliance with AML/CFT requirements consistent with standards set by the FATF, and has adequate AML/CFT measures in place to comply with those requirements;
(b) the financial adviser takes appropriate steps to identify, assess and understand the money laundering and terrorism financing risks particular to the countries or jurisdictions that the third party operates in;
(c) the third party is not one which financial advisers have been specifically precluded by the Authority from relying upon; and
(d) the third party is able and willing to provide, without delay, upon the financial adviser’s request, any data, documents or information obtained by the third party -
Question 4 of 30
4. Question
What measures shall be preformed by a financial adviser in relation to the documents and information?
I. All requirements imposed by law are met.
II. Any individual transaction undertaken by the financial adviser can be reconstructed.
III. The authority are able to review the financial adviser’s business relations, transactions, records and CDD information.
IV. The financial adviser can satisfy any enquiry or order from the relevant authorities in Singapore for information.
Correct
A financial adviser shall perform the measures as required by the paragraph above such that:
(a) all requirements imposed by law (including Notice No: FAA-N06) are met;
(b) any individual transaction undertaken by the financial adviser can be reconstructed (including the amount and type of currency involved) so as to provide, if necessary, evidence for prosecution of criminal activity;
(c) the Authority or other relevant authorities in Singapore and the internal and external auditors of the financial adviser are able to review the financial adviser’s business relations, transactions, records and CDD information and assess the level of compliance with Notice No: FAA-N06; and
(d) the financial adviser can satisfy, within a reasonable time or any more specific time period imposed by law or by the requesting authority, any enquiry or order from the relevant authorities in Singapore for information.Incorrect
A financial adviser shall perform the measures as required by the paragraph above such that:
(a) all requirements imposed by law (including Notice No: FAA-N06) are met;
(b) any individual transaction undertaken by the financial adviser can be reconstructed (including the amount and type of currency involved) so as to provide, if necessary, evidence for prosecution of criminal activity;
(c) the Authority or other relevant authorities in Singapore and the internal and external auditors of the financial adviser are able to review the financial adviser’s business relations, transactions, records and CDD information and assess the level of compliance with Notice No: FAA-N06; and
(d) the financial adviser can satisfy, within a reasonable time or any more specific time period imposed by law or by the requesting authority, any enquiry or order from the relevant authorities in Singapore for information. -
Question 5 of 30
5. Question
To whom can a financial adviser provide any access to personal data about the individual that is in the possession or under the control of him?
I. An individual customer.
II. An individual beneficiary of a life insurance policy.
III. An individual appointed to act on behalf of a customer.
IV. An individual connected party of a customer.
Correct
A financial adviser shall not be required to provide an individual customer, an individual beneficiary of a life insurance policy, an individual appointed to act on behalf of a customer, an individual connected party of a customer or an individual beneficial owner of a customer, with:
(a) any access to personal data about the individual that is in the possession or under the control of the financial adviser.Incorrect
A financial adviser shall not be required to provide an individual customer, an individual beneficiary of a life insurance policy, an individual appointed to act on behalf of a customer, an individual connected party of a customer or an individual beneficial owner of a customer, with:
(a) any access to personal data about the individual that is in the possession or under the control of the financial adviser. -
Question 6 of 30
6. Question
What all information can a FA provide access to an individual customer or an individual appointed to act on behalf of a customer?
I. His full name.
II. His nationality.
III. His date of birth.
IV. His unique identification number.
Correct
A financial adviser shall, as soon as reasonably practicable, upon the request of an individual customer, an individual appointed to act on behalf of a customer, an individual connected party of a customer or an individual beneficial owner of a customer, provide the requesting individual with the right to:
(a) access the following types of personal data of that individual, that is in the possession or under the control of the financial adviser:
(i) his full name, including any alias;
(ii) his unique identification number (such as an identity card number, birth certificate number or passport number);
(iii) his residential address;
(iv) his date of birth
(v) his nationalityIncorrect
A financial adviser shall, as soon as reasonably practicable, upon the request of an individual customer, an individual appointed to act on behalf of a customer, an individual connected party of a customer or an individual beneficial owner of a customer, provide the requesting individual with the right to:
(a) access the following types of personal data of that individual, that is in the possession or under the control of the financial adviser:
(i) his full name, including any alias;
(ii) his unique identification number (such as an identity card number, birth certificate number or passport number);
(iii) his residential address;
(iv) his date of birth
(v) his nationality -
Question 7 of 30
7. Question
For the purposes of complying with Notice No: FAA-N06, a financial adviser may, use and disclose personal data of an individual customer:
Correct
For the purposes of complying with Notice No: FAA-N06, a financial adviser may, whether directly or through a third party, collect, use and disclose personal data of an individual customer, an individual beneficiary of a life insurance policy, an individual appointed to act on behalf of a customer, an individual connected party of a customer or an individual beneficial owner of a customer, without the respective individual’s consent.
Incorrect
For the purposes of complying with Notice No: FAA-N06, a financial adviser may, whether directly or through a third party, collect, use and disclose personal data of an individual customer, an individual beneficiary of a life insurance policy, an individual appointed to act on behalf of a customer, an individual connected party of a customer or an individual beneficial owner of a customer, without the respective individual’s consent.
-
Question 8 of 30
8. Question
What all should be considered by a financial adviser with respect to AML/CFT compliance officer?
I. He is suitably qualified.
II. He has adequate resources to all customer records.
III. He has timely access to all customer records.
IV. Other relevant information which he requires to discharge his functions.
Correct
A financial adviser shall ensure that the AML/CFT compliance officer, as well as any other persons appointed to assist him, is suitably qualified and, has adequate resources and timely access to all customer records and other relevant information which he requires to discharge his functions.
Incorrect
A financial adviser shall ensure that the AML/CFT compliance officer, as well as any other persons appointed to assist him, is suitably qualified and, has adequate resources and timely access to all customer records and other relevant information which he requires to discharge his functions.
-
Question 9 of 30
9. Question
Which is not a feature of an audit function maintained by a financial adviser?
Correct
A financial adviser shall maintain an audit function that is adequately resourced and independent, and that is able to regularly assess the effectiveness of the financial adviser’s internal policies, procedures and controls, and its compliance with regulatory requirements.
Incorrect
A financial adviser shall maintain an audit function that is adequately resourced and independent, and that is able to regularly assess the effectiveness of the financial adviser’s internal policies, procedures and controls, and its compliance with regulatory requirements.
-
Question 10 of 30
10. Question
A financial adviser shall take all appropriate steps to ensure that its employees, officers and representatives are regularly and appropriately trained on?
I. AML/CFT laws and regulations.
II. Prevailing techniques, methods and trends in money laundering and terrorism financing.
III. The financial adviser’s internal policies, procedures and controls on AML/CFT.
IV. The roles and responsibilities of employees, officers and representatives in combating money laundering and terrorism financing.
Correct
A financial adviser shall take all appropriate steps to ensure that its employees, officers and representatives (whether in Singapore or elsewhere) are regularly and appropriately trained on:
(a) AML/CFT laws and regulations, and in particular, CDD measures, detecting and reporting of suspicious transactions;
(b) prevailing techniques, methods and trends in money laundering and terrorism financing; and
(c) the financial adviser’s internal policies, procedures and controls on AML/CFT and the roles and responsibilities of employees, officers and representatives in combating money laundering and terrorism financing.Incorrect
A financial adviser shall take all appropriate steps to ensure that its employees, officers and representatives (whether in Singapore or elsewhere) are regularly and appropriately trained on:
(a) AML/CFT laws and regulations, and in particular, CDD measures, detecting and reporting of suspicious transactions;
(b) prevailing techniques, methods and trends in money laundering and terrorism financing; and
(c) the financial adviser’s internal policies, procedures and controls on AML/CFT and the roles and responsibilities of employees, officers and representatives in combating money laundering and terrorism financing. -
Question 11 of 30
11. Question
What are the 3 stages of money laundering?
I. Placement.
II. Layering.
III. Integration.
IV. Provision.
Correct
the process of ML comprises three stages, namely:
(a) Placement – The physical or financial disposal of the benefits derived from criminal conduct.
(b) Layering – The separation of these benefits from their original source by creating layers of financial transactions designed to disguise the ultimate source and transfer of these benefits.
(c) Integration – The provision of apparent legitimacy to the benefits derived from criminal conduct.Incorrect
the process of ML comprises three stages, namely:
(a) Placement – The physical or financial disposal of the benefits derived from criminal conduct.
(b) Layering – The separation of these benefits from their original source by creating layers of financial transactions designed to disguise the ultimate source and transfer of these benefits.
(c) Integration – The provision of apparent legitimacy to the benefits derived from criminal conduct. -
Question 12 of 30
12. Question
Which is Singapore’s primary legislation to combat terrorism financing?
Correct
Singapore’s primary legislation to combat TF is the TSOFA. Financial advisers may refer to the Inter-Ministry Committee on Terrorist Designation’s (“IMC-TD”) website for more information.
Incorrect
Singapore’s primary legislation to combat TF is the TSOFA. Financial advisers may refer to the Inter-Ministry Committee on Terrorist Designation’s (“IMC-TD”) website for more information.
-
Question 13 of 30
13. Question
What all constitute first line of defence in case of money laundering and terrorism financing?
I. Business units require robust controls to detect illicit activities.
II. Business units should be allocated sufficient resources to perform this function effectively.
III. The financial adviser’s policies, procedures and controls on AML/CFT should be clearly specified in writing.
IV. The financial adviser should adequately train employees, officers and representatives to be aware of their obligations.
Correct
As part of the first line of defence, business units require robust controls to detect illicit activities. They should be allocated sufficient resources to perform this function effectively. The financial adviser’s policies, procedures and controls on AML/CFT should be clearly specified in writing, and communicated to all relevant employees, officers and representatives in the business units. The financial adviser should adequately train employees, officers and representatives to be aware of their obligations, and provide instructions as well as guidance on how to ensure the financial adviser’s compliance with prevailing AML/CFT laws, regulations and notices.
Incorrect
As part of the first line of defence, business units require robust controls to detect illicit activities. They should be allocated sufficient resources to perform this function effectively. The financial adviser’s policies, procedures and controls on AML/CFT should be clearly specified in writing, and communicated to all relevant employees, officers and representatives in the business units. The financial adviser should adequately train employees, officers and representatives to be aware of their obligations, and provide instructions as well as guidance on how to ensure the financial adviser’s compliance with prevailing AML/CFT laws, regulations and notices.
-
Question 14 of 30
14. Question
How can a financial adviser’s board of directors and senior management understand the ML/TF risks the financial adviser is exposed to?
I. Receiving sufficient, frequent and objective information to form an accurate picture of the ML/TF risks including emerging.
II. Receiving sufficient and objective information to assess whether the financial adviser’s AML/CFT controls are adequate and effective.
III. Receiving information on legal and regulatory developments.
IV. Ensuring that processes are in place to escalate important decisions that directly impact the ability of the financial adviser to address and control ML/TF risks.
Correct
A financial adviser’s board of directors and senior management should understand the ML/TF risks the financial adviser is exposed to and how the financial adviser’s AML/CFT control framework operates to mitigate those risks. This should involve the board and senior management:
(a) receiving sufficient, frequent and objective information to form an accurate picture of the ML/TF risks.
(b) receiving sufficient and objective information to assess whether the financial adviser’s AML/CFT controls are adequate and effective.
(c) receiving information on legal and regulatory developments and the impact these have on the financial adviser’s AML/CFT framework; and
(d) ensuring that processes are in place to escalate important decisions that directly impact the ability of the financial adviser to address and control ML/TF risks.Incorrect
A financial adviser’s board of directors and senior management should understand the ML/TF risks the financial adviser is exposed to and how the financial adviser’s AML/CFT control framework operates to mitigate those risks. This should involve the board and senior management:
(a) receiving sufficient, frequent and objective information to form an accurate picture of the ML/TF risks.
(b) receiving sufficient and objective information to assess whether the financial adviser’s AML/CFT controls are adequate and effective.
(c) receiving information on legal and regulatory developments and the impact these have on the financial adviser’s AML/CFT framework; and
(d) ensuring that processes are in place to escalate important decisions that directly impact the ability of the financial adviser to address and control ML/TF risks. -
Question 15 of 30
15. Question
Who is not a legal person?
I. Companies
II. Bodies corporate
III. Foundations
IV. Joint ventures or associations
Correct
In relation to the definition of “legal person” in the Notice, examples of legal persons are companies, bodies corporate, foundations, anstalt, partnerships, joint ventures or associations.
Incorrect
In relation to the definition of “legal person” in the Notice, examples of legal persons are companies, bodies corporate, foundations, anstalt, partnerships, joint ventures or associations.
-
Question 16 of 30
16. Question
In conducting an enterprise-wide risk assessment, what are the broad ML/TF risk factors that the financial adviser should consider in relation to its customers?
I. The target customer markets and segments.
II. The profile and number of customers identified as higher risk.
III. The volumes and sizes of its customers’ transactions.
IV. The volumes and sizes of its customers’ funds transfer.
Correct
In conducting an enterprise-wide risk assessment, the broad ML/TF risk factors that the financial adviser should consider include:
(a) in relation to its customers:
(i) the target customer markets and segments;
(ii) the profile and number of customers identified as higher risk; and
(iii) the volumes and sizes of its customers’ transactions and funds transfers, considering the usual activities and the risk profiles of its customers;Incorrect
In conducting an enterprise-wide risk assessment, the broad ML/TF risk factors that the financial adviser should consider include:
(a) in relation to its customers:
(i) the target customer markets and segments;
(ii) the profile and number of customers identified as higher risk; and
(iii) the volumes and sizes of its customers’ transactions and funds transfers, considering the usual activities and the risk profiles of its customers; -
Question 17 of 30
17. Question
How can a financial assess the effectiveness of its risk mitigation procedures and controls?
I. Monitoring the financial adviser’s ability to identify changes in a customer profile.
II. Monitoring the potential for abuse of new business initiatives, products, practices and services for ML/TF purposes.
III. The compliance arrangements.
IV. The balance between the use of technology-based or automated solutions.
Correct
A financial adviser should assess the effectiveness of its risk mitigation procedures and controls by monitoring the following:
(a) the financial adviser’s ability to identify changes in a customer profile (e.g. Politically Exposed Persons status) and transactional behaviour observed in the course of its business;
(b) the potential for abuse of new business initiatives, products, practices and services for ML/TF purposes;
(c) the compliance arrangements (through its internal audit or quality assurance processes or external review);
(d) the balance between the use of technology-based or automated solutions with that of manual or people-based processes, for AML/CFT risk management purposes.Incorrect
A financial adviser should assess the effectiveness of its risk mitigation procedures and controls by monitoring the following:
(a) the financial adviser’s ability to identify changes in a customer profile (e.g. Politically Exposed Persons status) and transactional behaviour observed in the course of its business;
(b) the potential for abuse of new business initiatives, products, practices and services for ML/TF purposes;
(c) the compliance arrangements (through its internal audit or quality assurance processes or external review);
(d) the balance between the use of technology-based or automated solutions with that of manual or people-based processes, for AML/CFT risk management purposes. -
Question 18 of 30
18. Question
Which is not an example of trigger event?
I. When a significant transaction takes place.
II. When a material change occurs in the way the customer’s business relations are managed.
III. When the financial adviser’s policies, procedures or standards relating to the documentation of CDD information change substantially.
IV. The financial adviser becomes aware that it lacks sufficient information about the customer concerned.
Correct
Examples of trigger events are when
(i) a significant transaction takes place,
(ii) a material change occurs in the way the customer’s business relations are managed,
(iii) the financial adviser’s policies, procedures or standards relating to the documentation of CDD information change substantially,
(iv) the financial adviser becomes aware that it lacks sufficient information about the customer concerned.Incorrect
Examples of trigger events are when
(i) a significant transaction takes place,
(ii) a material change occurs in the way the customer’s business relations are managed,
(iii) the financial adviser’s policies, procedures or standards relating to the documentation of CDD information change substantially,
(iv) the financial adviser becomes aware that it lacks sufficient information about the customer concerned. -
Question 19 of 30
19. Question
Why applications and transactions undertaken across the internet may pose greater risks than other non-face-to- face business?
I. The ease of unauthorised access to the facility, across time zones and location.
II. The ease of making multiple fictitious applications without incurring extra cost or the risk of detection.
III. The absence of physical documents.
IV. The speed of electronic transactions.
Correct
A financial adviser should note that applications and transactions undertaken across the internet may pose greater risks than other non-face-to- face business due to the following factors:
(a) the ease of unauthorised access to the facility, across time zones and location;
(b) the ease of making multiple fictitious applications without incurring extra cost or the risk of detection;
(c) the absence of physical documents; and
(d) the speed of electronic transactions,Incorrect
A financial adviser should note that applications and transactions undertaken across the internet may pose greater risks than other non-face-to- face business due to the following factors:
(a) the ease of unauthorised access to the facility, across time zones and location;
(b) the ease of making multiple fictitious applications without incurring extra cost or the risk of detection;
(c) the absence of physical documents; and
(d) the speed of electronic transactions, -
Question 20 of 30
20. Question
What additional checks can be preformed by FA to manage the risk of impersonation?
I. Telephone contact with the customer at a residential or business number that can be verified independently.
II. Confirmation of the customer’s address through an exchange of correspondence.
III. Confirmation of the customer’s salary details by requiring the presentation of recent bank statements.
IV. Provision of certified identification documents by lawyers or notaries public.
Correct
Where verification of identity is performed without face-to-face contact (e.g. electronically), a financial adviser should apply additional checks to manage the risk of impersonation.The additional checks may consist of robust anti-fraud checks that the financial adviser routinely undertakes as part of its existing procedures, which may include:
(a) telephone contact with the customer at a residential or business number that can be verified independently;
(b) confirmation of the customer’s address through an exchange of correspondence or other appropriate method;
(d) confirmation of the customer’s salary details by requiring the presentation of recent bank statements, where applicable;
(e) provision of certified identification documents by lawyers or notaries public.Incorrect
Where verification of identity is performed without face-to-face contact (e.g. electronically), a financial adviser should apply additional checks to manage the risk of impersonation.The additional checks may consist of robust anti-fraud checks that the financial adviser routinely undertakes as part of its existing procedures, which may include:
(a) telephone contact with the customer at a residential or business number that can be verified independently;
(b) confirmation of the customer’s address through an exchange of correspondence or other appropriate method;
(d) confirmation of the customer’s salary details by requiring the presentation of recent bank statements, where applicable;
(e) provision of certified identification documents by lawyers or notaries public. -
Question 21 of 30
21. Question
What is the duration for the completion of verification after the establishment of business relations?
Correct
The completion of verification should not exceed 30 business days after the establishment of business relations;
Incorrect
The completion of verification should not exceed 30 business days after the establishment of business relations;
-
Question 22 of 30
22. Question
What action should be taken by FA if verification remains uncompleted 120 business days after the establishment of business relations?
Correct
The financial adviser should terminate business relations with the customer if such verification remains uncompleted 120 business day after the establishment of business relations.
Incorrect
The financial adviser should terminate business relations with the customer if such verification remains uncompleted 120 business day after the establishment of business relations.
-
Question 23 of 30
23. Question
What care should be taken in the screening process?
I. It should take into account the nature, size and risk profile of a financial adviser’s business.
II. A financial adviser should be aware of any shortcomings in its automated screening systems.
III. It is important to consider “fuzzy matching” to identify non- exact matches.
IV. The financial adviser should ensure that the fuzzy matching process is calibrated to the risk profile of its business.
Correct
The level of automation used in the screening process should take into account the nature, size and risk profile of a financial adviser’s business. A financial adviser should be aware of any shortcomings in its automated screening systems. In particular, it is important to consider “fuzzy matching” to identify non- exact matches. The financial adviser should ensure that the fuzzy matching process is calibrated to the risk profile of its business.
Incorrect
The level of automation used in the screening process should take into account the nature, size and risk profile of a financial adviser’s business. A financial adviser should be aware of any shortcomings in its automated screening systems. In particular, it is important to consider “fuzzy matching” to identify non- exact matches. The financial adviser should ensure that the fuzzy matching process is calibrated to the risk profile of its business.
-
Question 24 of 30
24. Question
Which is not an example of SCDD measure?
Correct
Where a financial adviser is satisfied that the risks of money laundering and terrorism financing are low, a financial adviser may perform SCDD measures. Examples of possible SCDD measures include:
(a) reducing the frequency of updates of customer identification information;
(b) reducing the degree of ongoing monitoring and scrutiny of transactions, based on a reasonable monetary threshold; and
(c) choosing another method to understand the purpose and intended nature of business relations by inferring this from the type of transactions.Incorrect
Where a financial adviser is satisfied that the risks of money laundering and terrorism financing are low, a financial adviser may perform SCDD measures. Examples of possible SCDD measures include:
(a) reducing the frequency of updates of customer identification information;
(b) reducing the degree of ongoing monitoring and scrutiny of transactions, based on a reasonable monetary threshold; and
(c) choosing another method to understand the purpose and intended nature of business relations by inferring this from the type of transactions. -
Question 25 of 30
25. Question
What are the examples of potentially lower ML/TF risk situations?
I. A Singapore Government entity.
II. Entities listed on a stock exchange and subject to regulatory disclosure requirements.
III. An FI incorporated or established outside Singapore that is subject to and supervised for compliance with AML/CFT requirements.
IV. A pension, superannuation or similar scheme that provides retirement benefits to employees.
Correct
Subject to the requirement that a financial adviser’s assessment of low ML/TF risks is supported by an adequate analysis of risks, examples of potentially lower ML/TF risk situations include:
(a) Customer risk
(i) a Singapore Government entity;
(ii) entities listed on a stock exchange and subject to regulatory disclosure requirements relating to adequate transparency in respect of beneficial owners (imposed through stock exchange rules, law or other enforceable means); and
(iii) an FI incorporated or established outside Singapore that is subject to and supervised for compliance with AML/CFT requirements
(iv) a pension, superannuation or similar scheme that provides retirement benefits to employeesIncorrect
Subject to the requirement that a financial adviser’s assessment of low ML/TF risks is supported by an adequate analysis of risks, examples of potentially lower ML/TF risk situations include:
(a) Customer risk
(i) a Singapore Government entity;
(ii) entities listed on a stock exchange and subject to regulatory disclosure requirements relating to adequate transparency in respect of beneficial owners (imposed through stock exchange rules, law or other enforceable means); and
(iii) an FI incorporated or established outside Singapore that is subject to and supervised for compliance with AML/CFT requirements
(iv) a pension, superannuation or similar scheme that provides retirement benefits to employees -
Question 26 of 30
26. Question
Which is not an example of potentially higher risk categories?
Correct
Examples of potentially higher risk categories of the Notice include:
(a) Customer risk
(i) customers from higher risk businesses / activities / sectors identified in Singapore’s NRA
(ii) the ownership structure of the legal person or arrangement appears unusual or excessively complex
(iii) legal persons or legal arrangements that are personal asset holding vehicles.Incorrect
Examples of potentially higher risk categories of the Notice include:
(a) Customer risk
(i) customers from higher risk businesses / activities / sectors identified in Singapore’s NRA
(ii) the ownership structure of the legal person or arrangement appears unusual or excessively complex
(iii) legal persons or legal arrangements that are personal asset holding vehicles. -
Question 27 of 30
27. Question
In the context of Singapore, whom all should domestic PEPs should include?
I. Government Ministers
II. Members of Parliament
III. Nominated Members of Parliament
IV. Non-Constituency Members of Parliament
Correct
In the context of Singapore, domestic PEPs should include at least all Government Ministers, Members of Parliament, Nominated Members of Parliament and Non-Constituency Members of Parliament.
Incorrect
In the context of Singapore, domestic PEPs should include at least all Government Ministers, Members of Parliament, Nominated Members of Parliament and Non-Constituency Members of Parliament.
-
Question 28 of 30
28. Question
Which is not an examples of an international organisation?
I. The United Nations and affiliated agencies.
II. Asian Development Bank.
III. Association of Southeast Asian Nations Secretariat.
IV. Institutions of the European Union.
Correct
Examples of an “international organisation” include the United Nations and affiliated agencies such as the International Maritime organisation and the International Monetary Fund; regional international organisations such as the Asian Development Bank, Association of Southeast Asian Nations Secretariat, institutions of the European Union, the Organisation for Security and Cooperation in Europe; military international organisations such as the North Atlantic Treaty Organisation; and economic organisations such as the World Trade Organisation or the Asia-Pacific Economic Cooperation Secretariat.
Incorrect
Examples of an “international organisation” include the United Nations and affiliated agencies such as the International Maritime organisation and the International Monetary Fund; regional international organisations such as the Asian Development Bank, Association of Southeast Asian Nations Secretariat, institutions of the European Union, the Organisation for Security and Cooperation in Europe; military international organisations such as the North Atlantic Treaty Organisation; and economic organisations such as the World Trade Organisation or the Asia-Pacific Economic Cooperation Secretariat.
-
Question 29 of 30
29. Question
What does Source of wealth generally refers to?
I. The origin of the customer’s and beneficial owner’s entire body of wealth.
II. This relates to how the customer and beneficial owner have acquired the wealth which is distinct from identifying the assets that they own.
III. It gives an indication about the size of wealth the customer and beneficial owner would be expected to have.
IV. It may be general information from the customer, commercial databases or other open sources.
Correct
Source of wealth generally refers to the origin of the customer’s and beneficial owner’s entire body of wealth (i.e. total assets). This relates to how the customer and beneficial owner have acquired the wealth which is distinct from identifying the assets that they own. Source of wealth information should give an indication about the size of wealth the customer and beneficial owner would be expected to have, and how the customer and beneficial owner acquired the wealth. Although the financial adviser may not have specific information about assets that are not processed by the financial adviser, it may be possible to obtain general information from the customer, commercial databases or other open sources.
Incorrect
Source of wealth generally refers to the origin of the customer’s and beneficial owner’s entire body of wealth (i.e. total assets). This relates to how the customer and beneficial owner have acquired the wealth which is distinct from identifying the assets that they own. Source of wealth information should give an indication about the size of wealth the customer and beneficial owner would be expected to have, and how the customer and beneficial owner acquired the wealth. Although the financial adviser may not have specific information about assets that are not processed by the financial adviser, it may be possible to obtain general information from the customer, commercial databases or other open sources.
-
Question 30 of 30
30. Question
What are the examples of appropriate and reasonable means of establishing source of wealth?
I. Copies of trust deeds.
II. Audited accounts.
III. Salary details.
IV. Tax returns.
Correct
Examples of appropriate and reasonable means of establishing source of wealth are information and documents such as evidence of title, copies of trust deeds, audited accounts, salary details, tax returns and bank statements.
Incorrect
Examples of appropriate and reasonable means of establishing source of wealth are information and documents such as evidence of title, copies of trust deeds, audited accounts, salary details, tax returns and bank statements.