Free CRCM Exam Braindumps (page: 183)

Page 182 of 344

Which of the following customers may be exempted under Phase II of the Bank Secrecy Act?

  1. Government agencies
  2. Correspondent banks
  3. Payroll customers
  4. Businesses whose stocks are traded on a national stock exchange

Answer(s): C



In which of the following circumstances is it LEAST appropriate for a bank to file a SAR regarding Internet activity?

  1. Bank determines that one of its customers is the victim of identity theft
  2. Bank becomes aware of identity theft of its domain name (i.e., another entity selects a name similar to the bank's in order to confuse customers and obtain confidential financial information)
  3. Bank discovers that someone has hacked into its data system in order to obtain confidential customer data
  4. Bank determines through its transaction-monitoring program that a customer is making electronic transfers between his own checking and savings accounts that are just below the $10,000 reporting level

Answer(s): D



In which of the following circumstances is it LEAST appropriate for a bank to file a SAR regarding Internet activity?

  1. Bank determines that one of its customers is the victim of identity theft
  2. Bank becomes aware of identity theft of its domain name (i.e., another entity selects a name similar to the bank's in order to confuse customers and obtain confidential financial information)
  3. Bank discovers that someone has hacked into its data system in order to obtain confidential customer data
  4. Bank determines through its transaction-monitoring program that a customer is making electronic transfers between his own checking and savings accounts that are just below the $10,000 reporting level

Answer(s): D



In which of the following circumstances is it LEAST appropriate for a bank to file a SAR regarding Internet activity?

  1. Bank determines that one of its customers is the victim of identity theft
  2. Submit a copy of the supporting documentation with the SAR
  3. Bank becomes aware of identity theft of its domain name (i.e., another entity selects a name similar to the bank's in order to confuse customers and obtain confidential financial information)
  4. Submit the SAR within 30 days of the initial detection of facts
  5. Bank discovers that someone has hacked into its data system in order to obtain confidential customer data
  6. Report the SAR information to the bank's board of directors
  7. Bank determines through its transaction-monitoring program that a customer is making electronic transfers between his own checking and savings accounts that are just below the $10,000 reporting level
  8. Maintain a copy of the SAR and supporting documentation for 5 years

Answer(s):






Post your Comments and Discuss Banking CRCM exam with other Community members:

CRCM Discussions & Posts