ABA AML and Fraud Professional Exam Syllabus

AML and Fraud Professional PDF, CAFP Dumps, CAFP PDF, AML and Fraud Professional VCE, CAFP Questions PDF, ABA CAFP VCE, ABA AML and Fraud Professional Dumps, ABA AML and Fraud Professional PDFUse this quick start guide to collect all the information about ABA AML and Fraud Professional (CAFP) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the CAFP ABA AML and Fraud Professional exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual ABA AML and Fraud Professional certification exam.

The ABA AML and Fraud Professional certification is mainly targeted to those candidates who want to build their career in Professional Level domain. The ABA Certified AML and Fraud Professional (CAFP) exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of ABA AML and Fraud Professional.

ABA AML and Fraud Professional Exam Summary:

Exam Name ABA Certified AML and Fraud Professional (CAFP)
Exam Code CAFP
Exam Price $575 (USD)
Duration 180 mins
Number of Questions 150
Passing Score Pass/Fail
Schedule Exam EXAM APPLICATION
Sample Questions ABA AML and Fraud Professional Sample Questions
Practice Exam ABA CAFP Certification Practice Exam

ABA CAFP Exam Syllabus Topics:

Topic Details

Assessment - 35%

Establish procedures to consistently address regulatory requirements. Knowledge required:
  • Risk assessment process
    - Identification of specific risk categories
    - Analysis of specific risk categories
  • Compliance guidance and regulations for a Customer Identification Program (CIP)
    - CIP notices
    - Section 311 of the USA PATRIOT Act
    - Section 326 of the USA PATRIOT Act
  • Compliance guidance and regulations for customer due diligence (CDD)/enhanced due diligence (EDD)
    - May 2016 Financial Crimes Enforcement Network (FinCEN) Final Rule CDD/beneficial ownership and FAQs
    - Federal Financial Institutions Examination Council (FFIEC) special measures
  • Compliance guidance and regulations for customer risk rating/Know Your Customer (KYC)
    - FFIEC Appendix K
    - Customer risk factors to determine overall risk posed to the institution
    - Procedures for identifying and reporting of suspicious activity
  • Compliance guidance and regulations for politically exposed persons (PEPs)
    - FFIEC
    - FinCEN FAQs and guidance
    - Fact Sheet for Section 312 of the USA PATRIOT Act Final Regulation and Notice of Proposed Rulemaking
  • Compliance guidance and regulations for Office of Foreign Assets Control (OFAC)
    - OFAC regulations for the financial community
    - OFAC Enforcement Guidelines
    - OFAC FAQs
    - FFIEC
    - "Specially Designated Nationals" (SDN) versus sanctions
    - Reporting requirements
    - Record retention
    - Initial and ongoing screening
    - Blocking versus rejecting transactions
  • Fraud guidance and regulations (e.g., identity theft, synthetic, first-party)
    - Fair and Accurate Credit Transactions Act (FACTA) Red Flags Rule
    - FFIEC multifactor authentication
    - Fannie Mae and Freddie Mac requirements
    - SEC requirements (e.g., Ponzi, pump-and-dump, insider trading)
  • Cyber guidance
    - Executive Order 13691
    - Executive Order 51117
    - Economic Espionage Act of 1996
    - FinCEN Advisories FIN-2016-A005, FIN-2016-A003, FIN-2013-A001, FIN-2012-A005, and FIN-2011-A016
    - FinCEN Guidance on the Scope of Permissible Information Sharing covered by Section 314(b) Safe Harbor of the USA PATRIOT Act
Evaluate customer risk. Knowledge required:
  • Compliance guidance and regulations (e.g., CIP, CDD/EDD, OFAC)
    - FFIEC
    - USA PATRIOT Act Sections 312 and 326
    - U.S. Treasury Guidance for Financial Institutions
    - FFIEC Appendix J and Appendix K
  • Fraud guidance and regulations (e.g., identity theft, synthetic, first-party)
    - Identity theft (FinCEN advisory, FACTA, Federal Trade Commission [FTC], red flags)
    - New account fraud (FinCEN advisory, red flags)
    - First-party fraud (deposit, credit)
Evaluate risk to prevent and detect financial crimes. Knowledge required:
  • Relationship risk (e.g., beneficial ownership, account maintenance, vendor, employee, customer)
  • Geographic risk (e.g., Financial Action Task Force [FATF], State Department, OFAC, U.S. Postal Service, Organisation for Economic Co-operation and Development (OECD), high-intensity drug trafficking area [HIDTA], high-intensity financial crimes areas [HIFCA], Geographic Targeting Orders [GTO])
  • Product/service risk (e.g., channels, assessment of risk, fraud solutions)
  • Cyber risk (e.g., National Institute of Standards and Technology [NIST], SWIFT Customer Security Program [CSP] [self-attestation])
  • Transaction risk and fraud types (e.g., counterfeit, lost/stolen, altered, endorsement, account takeover [ATO], e-commerce, unauthorized, scams)
Monitor external sources of information (e.g., negative news, dark web, forums, social media). Knowledge required:
  • Common points of purchase (CPP)
  • Financial Services Information Sharing and Analysis Center (FS-ISAC)
  • Dark web (compromised data, evolving tactics, threats to an institution)
  • Open-source intelligence
Participate in internal and external information sharing to gain intelligence. Knowledge required:
  • FinCEN advisory (formal collaboration between financial crimes and information security)
  • FS-ISAC
  • InfraGard
  • Section 314(b) of the USA PATRIOT Act
  • U.S. Secret Service Electronic Crimes Task Force
  • Department of Homeland Security’s Enhanced Cybersecurity Services
  • Third-party services (FICO, early warning systems [EWS], processors and payment network, roundtable information sharing, BITS)
Analyze an event or alert to determine the next course of action. Knowledge required:
  • Anti-money laundering (AML) and fraud scenarios/typologies
  • Brute force attacks (rainbow table)
  • Malware
  • Social engineering (e.g., business email compromise [BEC], distributed denial of service [DDoS], phishing, vishing, spoofing)
  • Network attacks (Bluejacking, Bluesnarfing, port scanning, device ID)
  • Jackpotting (hardware/software machine or terminal)
  • Identification and reporting of suspicious activity
Develop rules and strategies for system alert generation. Knowledge required:
  • AML and fraud false-positive rates
  • AML and fraud detection rates
  • Control and client impact/customer experience rule
  • Champion challenger/estimators
  • Anomaly detection (AML, cyber, fraud)
  • Model validation
  • Risk appetite

Investigations - 30%

Review an activity claim/type in a confirmed case. Knowledge required:
  • AML and fraud scenarios/typologies
  • Cyber-enabled financial crimes typologies
  • AML/terrorist financing typologies
Identify suspects (known or unknown) and victims in a confirmed case. Knowledge required:
  • KYC (e.g., internal information, Sections 314(a) and 314(b) of the USA PATRIOT Act)
  • Public records
  • OFAC
  • Open-source intelligence
  • Interviewing tactics (e.g., elicitation technique)
  • Types of law enforcement inquiries (e.g., Section 314(a) of the USA PATRIOT Act, subpoenas)
Determine suspicious activity type and priority level in a confirmed case. Knowledge required:
  • Thresholds (e.g., monetary, law enforcement interest, case types)
  • Recoverability (i.e., transactions and liability)
  • Types of suspicious activity listed on the suspicious activity report (SAR) form, including “other”
  • AML and fraud scenarios/typologies
Conduct research by using internal and external sources of intelligence. Knowledge required:
  • Internal sources of intelligence
    - Handwriting comparison
    - Video surveillance
    - Telephony (e.g., voice, automated number identification [ANI], device)
    - Cyber Indicators (e.g., IP address, user agent string, hosting provider, URL, image)
    - Account relationship/transaction information (e.g., statements, internal communication, account opening documents)
  • External sources of intelligence
    - Open-source intelligence (e.g., social media)
    - Negative news
    - Screening (e.g., OFAC, external lists)
    - Section 314(b) of the USA PATRIOT Act
Build the case file, including supporting documentation. Knowledge required:
  • How to pull public records
  • How to analyze account relationship/transaction information (e.g., statements, internal communication, account opening documents)
  • Time frame requirements (e.g., Regulation E, SAR filing)
  • Required documents based on activity type
  • Documentation to support SAR and non-SAR decisioning
Determine the next course of action (e.g., account closure, reporting) in a confirmed case based on the identified risk. Knowledge required:
  • Section 314(b) of the USA PATRIOT Act
  • SAR confidentiality
  • Customer risk score modification
  • Financial institution risk appetite
  • When to elevate the case internally or externally

Reporting - 17%

Identify appropriate regulatory reporting requirements and file (or assist with filing) initial and ongoing reports (e.g., currency transaction reports [CTRs], SARs, FACTA Red Flags Rule, Report of Foreign Bank and Financial Accounts [FBAR], Bank Secrecy Act Designation of Exempt Person [DOEP]). Knowledge required:
  • Thresholds
  • Time frames
  • FinCEN e-filing
  • Appropriate audience for reporting
  • Record retention requirements
  • Follow-up reporting
  • Amendments
  • Backfiling
  • Exemptions
  • Section 314(a) of the USA PATRIOT Act
  • Section 314(b) of the USA PATRIOT Act
  • How to report OFAC blocked or rejected customers to the U.S. Treasury
File or assist with filing non-regulatory required reports (e.g., card networks, government sponsored enterprises [GSEs], credit reporting agencies [CRAs]). Knowledge required:
  • What to submit to internal or external information sharing partners (indicators of compromise [IOCs])
  • How to submit documentation regarding card fraud loss
Respond to law enforcement requests. Knowledge required:
  • When a subpoena is required
  • Parameters of Section 314(a) of the USA PATRIOT Act

Remediation - 18%

Establish and update controls (e.g., update procedures, tune rules, policy changes). Knowledge required:
  • How to identify procedural gaps
  • How to update procedures to address gaps
  • How to find guidance and regulatory updates
Manage relationships with customers and intermediaries (e.g., retention or termination). Knowledge required:
  • OFAC
  • Higher risk industries (e.g., marijuana-related businesses [MRBs], money services businesses [MSBs], correspondent banking/SWIFT CSP)
Engage in entity and/or victim remediation (e.g., return money, open new accounts, update third-party agencies, recover funds, charge off). Knowledge required:
  • Availability of Funds and Collection of Checks (Regulation CC)
  • Electronic Funds Act (Regulation E) and error resolution process
  • Fair Credit Reporting Act (FCRA)
  • FACTA ID theft remediation
  • Hold harmless agreement
Educate and train customers, employees, and third parties. Knowledge required:
  • Training pillar of Bank Secrecy Act (BSA)
  • Notice to Customers: A CTR Reference Guide
  • Identity theft red flags
  • Emerging typologies

To ensure success in ABA AML and Fraud Professional certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for ABA AML and Fraud Professional (CAFP) exam.

Rating: 5 / 5 (75 votes)