| Exam Code/Number: | CFCSJoin the discussion |
| Exam Name: | Financial Crime Specialist |
| Certification: | ACFCS |
| Question Number: | 175 |
| Publish Date: | Dec 17, 2025 |
|
Rating
100%
|
|
Many IT users require privileged user rights to perform their job tasks.
Which is the BEST action to help ensure data security with respect to privileged users?
You are an examiner for a financial industry regulator One of your smaller firms has shown a dramatic increase in wire activity that you think may be indicative of them facilitating money laundering. You request their outgoing wire transactionsfor the past six months and they provide you a spreadsheet with nearly 10,000 wires.
Which two criteria would be the MOST effective way to narrow down your sample for investigation? Choose
2 answers
A credit card company has recently become aware that fraudsters are obtaining multiple cards using stolen or synthetic identities II is now reviewing its card application process to identify potential weaknesses.
Which two elements in the company's application process are potential weaknesses? Choose 2 answers
During an organizational overview of financial crime controls, Ms. Lee, the compliance analyst, discovers that certain high-risk customers have not undergone enhanced due diligence (EDD) as required by regulatory guidelines. What is the most appropriate action for Ms. Lee to take?
You work in cybersecurity lor a chain of retail stores. An employee in your security team has recently notified you of a potentially serious issue with the point of sale (POS) systems which run on the company s network Upon reviewing data being transmitted Irom the POS systems the employee has detected indicators that malware designed to scrape credit and debit card information is being run on the systems.
You immediately mobilize your cyber incident response team and begin investigating You discover thai the malware infection is widespread and that numerous stores are affected.
In the course of the investigation you discover the following information Which is the MOST likely vulnerability that led to this cybersecurity incident?