Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Swift Customer Security Programme Assessor Certification(CSPAC) CSP-Assessor Questions and answers with ValidTests

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

Select the correct statement about SWIFT Alliance Cloud.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Alliance Cloud is a SWIFT cloud-based solution. It provides a universal channel to the financial community and to SWIFT Value Added services and initiatives

B.

Alliance Cloud is a cloud-based solution. It is offered by the 3 official public cloud providers. This allows customers the choice to select their preferred cloud provider

C.

Alliance Cloud is a cloud-based solution. It is offered by any public cloud provider that subscribed to the digital connectivity initiative

D.

Alliance Cloud is a SWIFT cloud-based solution. It consists of an Alliance Access instance deployed at one of the three SWIFT-approved public cloud providers

Expert Solution
Questions # 2:

What type of keys does the HSM box store? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Private keys

B.

Public keys

C.

Both private and public keys

Expert Solution
Questions # 3:

On which one of the following components must a Password/PIN Policy not be defined and implemented as per the CSCF? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

Options:

A.

Operator PCs, (physical or virtual) systems running SWIFT-related components, network devices protecting the secure zone(s), bridging servers

B.

Jump server(s), SWIFT-related components at application level

C.

Personal tokens or mobile devices used as a possession factor

D.

All equipment within the user environment

Expert Solution
Questions # 4:

The messaging operator in Alliance Lite2… (Select the two correct answers that apply)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Can create and modify messages

B.

Can assign RBAC roles to RMA operators and messaging operators

C.

Can approve the Customer Security Officer change requests

D.

Can approve messages

Expert Solution
Questions # 5:

Which of the following statements best describe valid implementations when implementing control 2.9 Transaction Business Controls? (Choose all that apply.)

Question # 5

Options:

A.

Multiple measures must be implemented by the Swift user to validate the flows of transactions are in the bounds of the normal expected business

B.

A customer designed implementation or a combination of different measures are deemed valid if they sufficiently mitigate the control risks

C.

Reliance on a recent business assessment or regulator response confirming the effectiveness of the control (as an example CPMI's_ requirement) is especially poignant to this control

D.

Any solutions is acceptable so long as the CISO approves the implementation

Expert Solution
Questions # 6:

How are online SwiftNet Security Officers authenticated? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Via their PKI certificate

B.

Via their swift.com account and secure code card

C.

Via their swift.com account

Expert Solution
Questions # 7:

What type of control effectiveness needs to be validated for an independent assessment?

Question # 7

Options:

A.

Effectiveness is never validated only the control design

B.

An independent assessment is a point in time review with possible reviews of older evidence as appropriate

C.

Operational effectiveness needs to be validated

D.

None of the above

Expert Solution
Questions # 8:

What must a Swift user implement to comply with a CSCF security control?

Question # 8

Options:

A.

A solution that maps the implementation guidelines described for a controls in scope components

B.

A solution that meets the control objectives and addresses the risk drivers for the in scope components)

Expert Solution
Questions # 9:

The bridging servers supporting the data exchange between the back-office and the SWIFT infrastructure are in scope of security controls (for some as advisory).

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

Options:

A.

TRUE

B.

FALSE

Expert Solution
Questions # 10:

The outsourcing agent of the SWIFT user provided them with an independent assessment report covering the CSP components in their scope, and using the latest CSCF version for testing. Is it enough to support the CSP attestation for the outsourced components? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Yes, after confirmation and validation of the scope

B.

Yes, only if the outsourcing agent is a global trusted provider and published the report on their compliance portal

C.

No, an audit report (and not an assessment) is required from the outsourcing agent as an external provider

D.

No, except if the cloud provider components are partially covered by the SWIFT Alliance Connect Virtual programme

Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions