Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CSP-Assessor Customer Security Programme Assessor Certification(CSPAC) Questions and Answers

Questions 4

The Swift secure zone is composed of a Swift connector, a middleware server and a back office system Is the selection of only one of the above components a representative sample based on the High-Level Test Plan (HLTP) guidelines?

Options:

A.

Yes

B.

No

Buy Now
Questions 5

Is the restriction of Internet access only relevant when having Swift-related components in a secure zone?

Options:

A.

Yes, because if there is no secure zone then the internet connectivity does not need to be restricted

B.

No, because there can be in-scope general operator PCs used to access a Swift-related application hosted at a service provider

Buy Now
Questions 6

Which operator session flows are expected to be protected in terms of confidentiality and integrity? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

System administrator sessions towards a host running a SWIFT-related component (on-premises or remote)

B.

All sessions to and from a jump server used to access a component in a secure zone

C.

All sessions towards a SWIFT-related application run by an Outsourcing Agent, a Service Bureau, or an L2BA Provider

D.

All of the other answers are valid

Buy Now
Questions 7

The SWIFT VPN boxes are located between the Messaging and Communication interface.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 8

Which operator session flows are expected to be protected in terms of confidentiality and integrity? (Choose all that apply.)

Options:

A.

System administrator sessions towards a host running a Swift related component

B.

All sessions to and from a jump server used to access a component in a secure zone

C.

All sessions towards a secure zone (on-premises or hosted by a third-party or a Cloud Provider)

D.

All sessions towards a Swift related application run by an Outsourcing Agent, a Service Bureau or an L2BA Provider

Buy Now
Questions 9

The Swift HSM boxes:

Options:

A.

Are located at the network partner premises and managed by Swift

B.

Are located at the Swift user premises and managed by Swift

C.

Are located at the Swift user premises and managed by the Swift user

D.

Are located at the network partner premises and managed by Swift the network partner

Buy Now
Questions 10

Where is the implementation of multi-factor authentication deemed sufficient to support control 4.2 compliance? (Choose all that apply.)

Options:

A.

When accessing an outsourcing agent or an L2BA Swift-related application

B.

When logging-in on an interface, a connector, or the system running such component

C.

When login on the jump server filtering access to local Swift secure zone

D.

On the General Operator PC used to access a Swift-related component

Buy Now
Questions 11

The SWIFT user has installed its own Communication Interface on a dedicated virtual machine offered by a public cloud provider. Under which provider category does the public cloud provider fit, and what is the CSP impact? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

Options:

A.

The public cloud provider is considered a L2BA provider, and therefore not in scope of the CSP

B.

The public cloud provider is considered a SWIFT connectivity provider, and therefore not in scope of the CSP

C.

The public cloud provider is considered an outsourcing agent, and therefore in scope of the CSP

D.

This type of implementation is not allowed by the CSP

Buy Now
Questions 12

Which authentication methods are possible on the Alliance Interfaces? (Choose all that apply.)

Options:

A.

Password

B.

LDAP Authentication

C.

Radius One-time password

D.

Password and TOTP

Buy Now
Questions 13

Alliance Lite2 only supports the sending and receiving of FIN messages.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

A Swift user has moved from one Service Bureau to another What are the obligations of the Swift user in the CSP context?

Options:

A.

To inform the SB certification office at Swift WW

B.

To reflect that in the next attestation cycle

C.

None if there is no impact in the architecture tope

D.

To submit an updated attestation reflecting this change within 3 months

Buy Now
Questions 15

Select the correct statement about Alliance Gateway.

Options:

A.

It is used to exchange messages over the Swift network

B.

It is used to create messages to send over the Swift network

Buy Now
Questions 16

As a Swift CSP Certified Assessor, I left the listed provider and started to work independently. Can I continue to perform CSP assessments?

Options:

A.

Yes. during the certification validity period

B.

No, this is not allowed

C.

Yes. but not as a Swift CSP Certified assessor

D.

[No, except if Swift formally provides you permission

Buy Now
Questions 17

An application only uses (i) the SWIFT API for reporting and gpi basic tracker calls through (ii) a tailored account not allowing business transactions management. Is this application in scope of the CSCF? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Yes, it is in scope and considered a customer connector because it reads business transaction data

B.

No, it can be descoped because there is no business transaction management being performed

C.

No, it is not in scope because the API connection method is not in scope of the CSP

D.

Yes, it is in scope because the API connection method is less secure than SWIFT interfaces

Buy Now
Questions 18

Can a Swift user choose to implement the security controls (example: logging and monitoring) in systems which are not directly in scope of the CSCE?

Options:

A.

Yes

B.

No

Buy Now
Questions 19

How are online SwiftNet Security Officers authenticated?

Options:

A.

Via their PKI certificate

B.

Via their swift.com account and secure code card

C.

Via their swift.com account

Buy Now
Questions 20

A SWIFT user is not based in the same country as the assessor. The assessor would like to perform the assessment remotely. Is this permitted? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Remote assessments are not permitted under any circumstances

B.

This is permitted provided the same level of comfort can be guaranteed

C.

It is possible to perform an assessment remotely only with valid reasons. These reasons must be formally validated by SWIFT CSP office

D.

It is not allowed to conduct an assessment remotely under any circumstances. However, force majeure circumstances like the global pandemic are an exception to this

Buy Now
Questions 21

For which reasons (as per the "CSP Independent Assessment Process for Assessors Guidelines") is it required to keep minutes of all key meetings related to a CSP assessment process (examples: kick-off, scope definition, exit meeting)? (Select all answers that apply)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

To support quality review (audit) processes

B.

For documentation purpose

C.

To keep key information that can be used as input for the next step in the assessment process

D.

To be uploaded in KYC-SA at the end of the assessment (mandated by SWIFT)

Buy Now
Questions 22

A Treasury Management System (TMS) application is installed on the same machine as the customer connector (such as MQ server) connecting towards a Service Bureau Are these applications/systems in scope of CSCF?

Options:

A.

The TMS application, the MQ server and hosting system are in the scope of the CSCF and must be placed in a secure zone

B.

The TMS application, the MQ server and hosting system enters the scope of the CSCF advisory and should be placed in a secure zone

C.

Only the MO server application is in scope of the CSCF> The TMS application is considered as back-office

D.

The TMS application is the highest risk and must be secured appropriately. The MQ server should be secured on a best effort basis

Buy Now
Questions 23

What must a Swift user implement to comply with a CSCF security control?

Options:

A.

A solution that maps the implementation guidelines described for a controls in scope components

B.

A solution that meets the control objectives and addresses the risk drivers for the in scope components)

Buy Now
Questions 24

What are the conditions required to allow reliance on the compliance conclusion of a control assessed in the previous year? (Select all answers that apply)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

The control compliance conclusion must have already been relied on the past two years

B.

The previous assessment was performed on the CSCF version of the previous year (at least)

C.

The control definition has not changed

D.

The control design and implementation are the same

Buy Now
Questions 25

Can an internal audit department submit and approve their SWIFT user’s attestation on the KYC-SA SWIFT portal? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Yes, providing this is agreed by the head of IT operations and the CISO

B.

No, this is never an option

C.

Yes, an internal auditor can submit the attestation for approval provided they have the appropriate credentials for swift.com. The CISO remains in charge of the approval of the attestation

D.

Yes, with approval from the Chief Auditor

Buy Now
Questions 26

The bridging servers supporting the data exchange between the back-office and the SWIFT infrastructure are in scope of security controls (for some as advisory).

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

What does SWIFT provide? (Select the two correct answers that apply)

Options:

A.

A platform for messaging

B.

Standards for communicating

C.

Hosting for financial institutions

D.

A high-level programming language

Buy Now
Questions 28

What is the purpose of the High-Level Test Plan (HLTP) provided by SWIFT? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

The HLTP provides a way of testing and the typical evidence for each control (based on implementation guidelines) and must be strictly followed

B.

The HLTP provides a way of testing and the typical evidence for each control (based on implementation guidelines), testing should be ideally based on it

C.

The HLTP provides the rules to define the sample for testing

D.

The HLTP provides a detailed way of control testing

Buy Now
Questions 29

A Swift user has remediated an exception reported by the assessor. What are their obligations before updating and submitting an attestation reflecting the new compliance level?

Options:

A.

The exception must be re-assessed by an independent assessor. The assessor can be different to the one who initially raised the exception

B.

The exception must be re-assessed by the same independent assessor that raised the exception

C.

The first line of defense can confirm their level of compliance using a self-assessment approach

D.

None, if the remediation has been completed, a new attestation can be submitted reflecting the compliance of the control

Buy Now
Questions 30

A Treasury Management System (TMS) application is installed on the same machine as the customer connector, connecting to a Service Bureau. Are these applications/systems in scope of CSCF? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

The TMS application, the customer connector, and the hosting system are in the scope of the CSCF

B.

Only the customer connector application is in scope of the CSCF. The TMS application is a back-office

C.

The TMS application is the highest risk and must be secured appropriately. The customer connector should be secured on a best effort basis

D.

The TMS application, the customer connector, and the hosting system are in scope only if they connect directly to SWIFT, not towards a Service Bureau

Buy Now
Questions 31

Can an internal audit department submit and approve their Swift user's attestation on the KYC-SA Swift portal?

Options:

A.

Yes, providing this is agreed by the head of IT operations and the CISO

B.

No, this is never an option

C.

Yes, an internal auditor can submit the attestation for approval provided they have the appropriate credentials for switt.com. The CISO remains in charge of the approval of the attestation

D.

Yes, with approval from the Chief auditor

Buy Now
Questions 32

A Swift user can only exchange FIN messages via the Swift network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

In the illustration, identify which components are in scope of the CSCF? (Choose all that apply.)

Options:

A.

Components A, B, K

B.

Components J, K, I

C.

Components F, G, H

D.

Components C, E, M

Buy Now
Questions 34

May an assessor rely on an ISAE 3000 report dating back 2 years to support a CSP independent assessment? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

No, that is too old, the maximum is 18 months

B.

Yes, there is no time limit for an ISAE 3000 report

C.

No, an ISAE 3000 report is no valid substitute as a rule

D.

Yes, provided there is no change to the SWIFT user’s infrastructure

Buy Now
Exam Code: CSP-Assessor
Exam Name: Customer Security Programme Assessor Certification(CSPAC)
Last Update: Apr 2, 2025
Questions: 116
CSP-Assessor pdf

CSP-Assessor PDF

$25.5  $84.99
CSP-Assessor Engine

CSP-Assessor Testing Engine

$30  $99.99
CSP-Assessor PDF + Engine

CSP-Assessor PDF + Testing Engine

$40.5  $134.99