Data Science Interview Questions Data Science Interview Questions 1. What...
Read More
1. What is a Risk-Based Approach (RBA) in KYC?
Answer:
A Risk-Based Approach means allocating compliance resources based on the customer’s risk profile. Instead of treating all customers equally, institutions:
Apply Enhanced Due Diligence (EDD) to high-risk customers
Use Simplified Due Diligence (SDD) for low-risk customers
Continuously monitor based on evolving risk
2. How do you identify a high-risk customer?
Answer:
High-risk customers are identified based on:
Geography (high-risk jurisdictions, FATF grey/blacklist)
Industry (cash-intensive businesses, crypto, NGOs)
Customer type (PEPs, UBO complexity)
Transaction behavior (unusual patterns)
3. What is Enhanced Due Diligence (EDD)?
Answer:
EDD is a deeper investigation for high-risk customers involving:
Source of Wealth (SoW) & Source of Funds (SoF)
Senior management approval
Ongoing enhanced monitoring
Detailed ownership structure analysis
4. Explain Ultimate Beneficial Ownership (UBO) challenges.
Answer:
Key challenges include:
Complex ownership layers across jurisdictions
Use of shell companies/trusts
Nominee shareholders
Lack of transparency in offshore jurisdictions
5. How do you handle Politically Exposed Persons (PEPs)?
Answer:
For PEPs:
Conduct EDD
Identify role, influence, and country risk
Verify source of wealth/funds
Continuous monitoring for suspicious activity
6. What are red flags in KYC/CDD?
Answer:
Mismatch in customer information
Reluctance to provide documents
Complex ownership without clear purpose
Frequent changes in account details
Transactions inconsistent with profile
7. How do you verify Source of Wealth (SoW) vs Source of Funds (SoF)?
Answer:
SoW: Origin of total wealth (business ownership, inheritance, investments)
SoF: Origin of specific transaction funds (salary, sale proceeds)
👉 Verified using:
Bank statements
Tax returns
Contracts or sale agreements
8. What is ongoing monitoring in KYC?
Answer:
Continuous review of customer activity to ensure it aligns with their risk profile:
Transaction monitoring
Periodic KYC refresh (based on risk category)
Trigger-based reviews (e.g., unusual activity)
9. How do you deal with incomplete KYC documentation?
Answer:
Follow up with customer for missing info
Apply restrictions if needed (limited account functionality)
Escalate if non-compliant
Possibly exit relationship if risk persists
10. Explain FATF recommendations relevance in KYC.
Answer:
The Financial Action Task Force (FATF) sets global AML/KYC standards:
Defines customer due diligence requirements
Identifies high-risk jurisdictions
Guides risk-based compliance frameworks
11. What is adverse media screening?
Answer:
Checking negative news about a customer such as:
Fraud, corruption, money laundering
Legal or regulatory issues
12. How do you perform customer risk scoring?
Answer:
Based on:
Customer type
Geography
Product/service usage
Transaction patterns
13. What is periodic KYC review?
Answer:
Scheduled review of customer profiles:
High risk: 6–12 months
Medium risk: 1–2 years
Low risk: 3–5 years
14. How do you identify shell companies?
Answer:
Indicators:
No physical presence
No real business activity
High-volume transactions with no clear purpose
Complex ownership structures
15. Explain regulatory requirements for KYC in India.
Answer:
Key regulations:
RBI KYC guidelines
Prevention of Money Laundering Act (PMLA)
CKYC (Central KYC Registry)
16. What is a Suspicious Activity Report (SAR)?
Answer:
A report filed when suspicious transactions are detected:
Sent to Financial Intelligence Unit (FIU)
Must be confidential
Based on reasonable suspicion, not proof
17. How do you handle false positives in screening?
Answer:
Analyze matching parameters (name, DOB, nationality)
Use additional identifiers
Document rationale for dismissal
Escalate if uncertain
18. What is the role of technology in KYC?
Answer:
AI/ML for transaction monitoring
Automated screening tools
Digital KYC (e-KYC, Video KYC)
Reducing manual errors and improving efficiency
19. Describe a complex KYC case you handled.
Answer (Sample):
A client had a multi-layered ownership structure across offshore jurisdictions. I:
Identified UBO through registry checks
Conducted adverse media screening
Verified SoW using financial documents
Recommended EDD and monitoring
20. What would you do if you suspect money laundering?
Answer:
Investigate transaction patterns
Gather supporting evidence
Escalate internally (compliance team)
File SAR if required
Avoid tipping off the customer
Feel Free to Contact Us or WhatsApp Us for Career Counseling!
Data Science Interview Questions Data Science Interview Questions 1. What...
Read MoreTop 30 DevOps Interview Questions & Answers (2022 Update) Top...
Read MoreAnti Money Laundering Interview Questions Anti Money Laundering Interview Questions...
Read More
“Education is the most Powerful Weapon for Future”
Job Guarantee Courses:
Anti Money Laundering | Digital Marketing | RPA UiPath | IoT | Automation Testing Course Using Python or Java | PCB Design | Embedded System | Data Science | AWS Cloud Computing |
Trending Certification IT Courses:
Anti-Money Laundering Certification Course | Digital Marketing Certification Course | RPA UiPath Certification Course | Python Certification Course | IoT Certification Course |IoT Certification Course | Automation Testing Course Using Python or Java | PCB Design Course Certification | Embedded System Certification Course | Data Science Certification Course | AEM Certification Course | AWS Cloud Computing Certification Course |
©2026-27 dridhOn Services & Solutions. All Rights Reserved.
DISCLAIMER: THE NAMES OF THE CERTIFICATIONS ARE THE TRADEMARKS OF THEIR OWNERS.