Data Science Interview Questions Data Science Interview Questions 1. What...
Read More
1) What is a Risk-Based Approach (RBA) in AML?
A Risk-Based Approach (RBA) means allocating compliance resources based on the level of ML/TF risk associated with customers, products, geographies, and channels.
It is recommended by the Financial Action Task Force (FATF).
Key Components:
Customer Risk Assessment (CRA)
Enhanced Due Diligence (EDD) for high-risk clients
Ongoing monitoring
Periodic risk reassessment
Example:
High-risk customer (PEP from high-risk jurisdiction) → Enhanced monitoring + source of wealth verification.
2) Explain the Three Lines of Defense Model in AML.
1️⃣ First Line – Business/Operations (relationship managers, onboarding team)
2️⃣ Second Line – Compliance & Risk
3️⃣ Third Line – Internal Audit
This model ensures segregation of duties and independent oversight.
3) How do you conduct Enhanced Due Diligence (EDD)?
EDD includes:
Source of Funds (SOF) verification
Source of Wealth (SOW) validation
Adverse media screening
PEP screening
Transaction behavior analysis
UBO identification
For example, under India’s Prevention of Money Laundering Act (PMLA), reporting entities must apply enhanced scrutiny to high-risk customers.
4) How would you investigate a complex structuring case?
Steps:
Identify transaction pattern (smurfing, multiple small deposits)
Analyze linked accounts
Check geographic risk
Review KYC documents
Look for layering indicators
Escalate & file SAR if required
In the US, suspicious activity is reported under the Bank Secrecy Act.
5) What is the difference between Source of Funds and Source of Wealth?
| Source of Funds | Source of Wealth |
|---|---|
| Origin of specific transaction | How total wealth was accumulated |
| Short-term | Long-term |
| e.g., Sale of property | e.g., Business ownership over 15 years |
6) What are Model Validation Challenges in Transaction Monitoring?
Overfitting
High false positives
Threshold calibration issues
Data quality gaps
Regulatory explainability concerns
Regulators expect model governance aligned with FATF guidance.
7) How do you reduce False Positives in AML Monitoring?
Risk-based threshold tuning
Behavioral segmentation
Machine learning integration
Alert quality review
Customer risk reclassification
8) What are Key AML Risks in Cryptocurrency?
Pseudonymity
Cross-border transfers
Mixing services
DeFi anonymity
Sanctions evasion
Global AML standards apply as per FATF’s “Travel Rule”.
9) Explain Beneficial Ownership Risk.
Ultimate Beneficial Owners (UBOs) may hide behind:
Shell companies
Trusts
Nominee directors
Layered shareholding
Regulations require identification of UBOs controlling ≥25% ownership (varies by jurisdiction).
10) What is a Suspicious Activity Report (SAR)?
A SAR is filed when suspicious activity is identified that may involve money laundering, fraud, terrorism financing, or sanctions breaches.
It must be:
Confidential
Filed within regulatory timelines
Supported with detailed narrative
11) How does AML apply to FinTech?
FinTech risks include:
Instant onboarding
Digital wallets
Cross-border APIs
Embedded finance
Controls include:
e-KYC
Video KYC
Real-time monitoring
API-based screening
12) How do sanctions screening and AML differ?
| AML | Sanctions |
|---|---|
| Detects suspicious behavior | Prevents dealings with sanctioned parties |
| Pattern-based | Name-based |
| Risk-based monitoring | Zero tolerance blocking |
13) How do you perform a Customer Risk Assessment (CRA)?
CRA typically considers:
Customer type
Geography
Product usage
Delivery channel
Transaction behavior
Each factor is scored → aggregated → risk rating assigned.
14) What are Red Flags in Trade-Based Money Laundering (TBML)?
Over/under invoicing
Phantom shipments
Multiple invoicing
Round-tripping
Mismatch between goods and payment value
15) What is the Role of Compliance Officer in AML?
Policy development
Regulatory reporting
Training & awareness
Independent monitoring
Liaison with regulators
16) What is the difference between KYC, CDD, and EDD?
KYC (Know Your Customer) – The overall process of verifying customer identity.
CDD (Customer Due Diligence) – Risk-based assessment of the customer (standard level).
EDD (Enhanced Due Diligence) – Additional checks for high-risk customers like PEPs, high-risk jurisdictions, complex ownership structures.
KYC is the umbrella; CDD and EDD are levels of due diligence under it.
17) What are the four key components of CDD?
As per global standards by Financial Action Task Force:
Customer identification & verification
Beneficial ownership identification
Understanding purpose and nature of business relationship
Ongoing monitoring
18) How do you identify Ultimate Beneficial Ownership (UBO)?
Answer:
Identify individuals owning ≥25% (as per FATF; local thresholds may vary)
Trace ownership through layered entities
Identify controlling interest even if ownership is indirect
Check voting rights and control mechanisms
In India, UBO norms align with the Prevention of Money Laundering Act (PMLA).
19) How do you apply a Risk-Based Approach (RBA) in KYC?
Risk assessment is based on:
Customer risk (PEP, occupation, reputation)
Geographic risk (sanctioned/high-risk countries)
Product risk (private banking, correspondent banking)
Channel risk (non-face-to-face onboarding)
High-risk → EDD
Medium-risk → Standard CDD
Low-risk → Simplified due diligence
20) How do you handle Politically Exposed Persons (PEPs)?
Identify through screening tools
Obtain senior management approval
Establish source of funds & wealth
Apply enhanced monitoring
Conduct periodic review (annually or more frequent)
21) What is Ongoing Due Diligence?
It means:
Monitoring transactions against customer profile
Updating KYC periodically
Trigger-based reviews (large unusual transaction, change in ownership)
It ensures customer risk remains aligned with risk rating.
22) What are red flags in KYC review?
Complex ownership without business rationale
Frequent address changes
Mismatch between income and transaction pattern
Reluctance to provide documents
Use of shell companies
23) How does e-KYC differ from traditional KYC?
| Traditional KYC | e-KYC |
|---|---|
| Physical documents | Digital verification |
| In-person verification | Aadhaar/video verification |
| Slower process | Faster onboarding |
| Higher operational cost | Cost-effective |
In India, Aadhaar-based KYC is regulated under the Prevention of Money Laundering Act framework and RBI guidelines.
24) What is Video KYC (V-CIP)?
Video Customer Identification Process allows remote verification through live video interaction. It includes:
Geo-tagging
Liveness check
OTP verification
PAN verification
25) What challenges do financial institutions face in KYC?
False positives in screening
Complex corporate structures
Regulatory updates
Cross-border compliance
Data privacy regulations
26) What is FATCA and CRS in KYC?
FATCA – US tax compliance law requiring reporting of US persons
CRS (Common Reporting Standard) – Global tax transparency framework developed by Organisation for Economic Co-operation and Development
Banks must collect self-declarations during onboarding.
27) What is the role of technology in advanced KYC?
AI-based name screening
Transaction behavior analysis
Risk scoring models
Automated document verification
Biometric authentication
28) What would you do if a customer refuses to provide UBO details?
Explain regulatory requirement
Escalate to compliance
Do not onboard
File STR if suspicious
In India, STR is filed with Financial Intelligence Unit – India.
29) How do you conduct KYC for high-risk jurisdictions?
Refer to high-risk country lists published by Financial Action Task Force.
Steps:
Perform EDD
Verify source of funds
Enhanced transaction monitoring
Senior management approval
30: A corporate client has 5 layered entities across offshore jurisdictions. What steps will you take?
Answer:
Identify UBO through ownership tracing
Check offshore jurisdiction risk
Perform adverse media screening
Validate source of funds
Escalate to senior compliance
Apply EDD & enhanced monitoring
Data Science Interview Questions Data Science Interview Questions 1. What...
Read MoreTop 30 DevOps Interview Questions & Answers (2022 Update) Top...
Read MoreAnti Money Laundering Interview Questions Anti Money Laundering Interview Questions...
Read MoreWhatsApp us