Special Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CSP-Assessor Questions and Answers

Question # 6

Can an assessor re-use an ISAE 3000 report dating back 2 years to support an independent assessment?

A.

No, that is too old, the maximum is 18 months

B.

Yes, there is no time limit for an iSAE 3000 report

C.

No, the SAE 3000 report is no validsurrogateas a rule

D.

Yes, provided there is no change to the Swift user's infrastructure

Full Access
Question # 7

The messaging operator in Alliance Lite2… (Select the two correct answers that apply)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

Can create and modify messages

B.

Can assign RBAC roles to RMA operators and messaging operators

C.

Can approve the Customer Security Officer change requests

D.

Can approve messages

Full Access
Question # 8

In the context of CSP, what type of component is the Alliance Access? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

A Messaging Interface

B.

A Communication Interface

C.

A SWIFT Connector

D.

A Secure Server

Full Access
Question # 9

Which of the following statements best describe valid implementations when implementing control 2.9 Transaction Business Controls? (Choose all that apply.)

A.

Multiple measures must be implemented by the Swift user to validate the flows of transactions are in the bounds of the normal expected business

B.

A customer designed implementation or a combination of different measures are deemed valid if they sufficiently mitigate the control risks

C.

Reliance on a recent business assessment or regulator response confirming the effectiveness of the control (as an example CPMI's_ requirement) is especially poignant to this control

D.

Any solutions is acceptable so long as the CISO approves the implementation

Full Access
Question # 10

What is expected regarding Token Management when (physical or software-based) tokens are used? (Choose all that apply.)

A.

Similar to user accounts, individual assignment and ownership for accurate traceability and revocation in case of potential tampering, loss or in case of user role change

B.

Have in place a strict token assignment process. This avoids the need to perform g a regular review of assigned tokens

C.

Individuals must not share their tokens. Tokens must remain under the control and supervision of its owner

D.

All tokens must be stored in a safe when not used

Full Access
Question # 11

The Alliance Access OS administrator can create and send financial messages.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

TRUE

B.

FALSE

Full Access
Question # 12

In the case that nothing has changed in the SWIFT user’s infrastructure, is it possible to rely on a previous Independent assessment report without performing another independent assessment? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

Yes, full reliance can be provided without the need of an independent assessment if nothing has changed

B.

No, even if nothing has changed, an independent assessor needs to assess the conditions before being able to rely on the previous year’s assessment

C.

No, even if nothing has changed, an independent assessor needs to perform a full assessment including full testing every year

D.

Yes, full reliance can be provided if the CISO of the SWIFT user signs a letter which confirms that nothing has changed

Full Access
Question # 13

In an entity having a small infrastructure and only 2 operators, the HR manager explains in a short interview how the security training is implemented providing one example. Would it be acceptable?

A.

Yes. it's a risk based testing approach this can be enough in this case

B.

No. more evidence are required

Full Access
Question # 14

A Swift user can only exchange FIN messages via the Swift network.

A.

TRUE

B.

FALSE

Full Access
Question # 15

When hesitant on the applicability of a CSCF control to a particular component? What steps should you take? (Choose all that apply.)

A.

Call your Swift contact

B.

Check appendix F of the CSCF

C.

Check carefully the Introduction section of the CSCF

D.

Open a case with Swift support via the case manager on swift com if further information or solution cannot be found in the documentation

Full Access
Question # 16

How can PKI certificate requests be submitted to SWIFT? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

Using both online and offline methods

B.

Using an online method

C.

Using an offline method

D.

None of the above

Full Access
Question # 17

Which operator session flows are expected to be protected in terms of confidentiality and integrity? (Choose all that apply.)

A.

System administrator sessions towards a host running a Swift related component

B.

All sessions to and from a jump server used to access a component in a secure zone

C.

All sessions towards a secure zone (on-premises or hosted by a third-party or a Cloud Provider)

D.

All sessions towards a Swift related application run by an Outsourcing Agent, a Service Bureau or an L2BA Provider

Full Access
Question # 18

The SWIFT VPN boxes are located between the Messaging and Communication interface.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

TRUE

B.

FALSE

Full Access
Question # 19

Select the supporting documents to conduct a CSP assessment. (Choose all that apply.)

A.

The CSP User Handbook

B.

The mapping to industry standards article

C.

The Controls Matrix and High Level Test P an

D.

The Customer Security Controls Framework

Full Access
Question # 20

Is it mandated to perform security awareness and other specific trainings every year for individuals with SWIFT-critical roles? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

A.

Yes, and a track record must show that both awareness and specific training are performed annually

B.

No, both awareness and specific trainings are planned when deemed required

C.

No, awareness training expected to be performed yearly; specific training to maintain the required knowledge only when needed

D.

No, a track record must show that both awareness and specific training are performed at least bi-yearly (every 2 years)

Full Access
Question # 21

On which one of the following components must a Password/PIN Policy not be defined and implemented as per the CSCF? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

A.

Operator PCs, (physical or virtual) systems running SWIFT-related components, network devices protecting the secure zone(s), bridging servers

B.

Jump server(s), SWIFT-related components at application level

C.

Personal tokens or mobile devices used as a possession factor

D.

All equipment within the user environment

Full Access
Question # 22

May an assessor approve a SWIFT User’s KYC-SA attestation? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

Yes, if the KYC-SA application is set up in 2-eyes mode, it is possible for the assessor to submit and approve an attestation on behalf of the SWIFT user’s

B.

Yes, with agreement from the CISO of the SWIFT User

C.

No, the approval always remains the responsibility of the CISO of the SWIFT User (or similar level of responsibility)

D.

No, it is the responsibility of the SWIFT user’s internal audit to submit a CSP attestation

Full Access
Question # 23

A Swift user has moved from one Service Bureau to another What are the obligations of the Swift user in the CSP context?

A.

To inform the SB certification office at Swift WW

B.

To reflect that in the next attestation cycle

C.

None if there is no impact in the architecture tope

D.

To submit an updated attestation reflecting this change within 3 months

Full Access
Question # 24

To rely on a previous CSP assessment report conclusions, a limited testing approach was used. What is the expected sample size as per the High-Level Test Plan (HLTP) guidelines for each identified component? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

There is no need for a sample for this limited testing

B.

1

C.

3

D.

5

Full Access
Question # 25

Penetration testing must be performed at application level against the Swift-related components, such as the interfaces, Swift and customer connectors?

A.

True, those are key components

B.

False, only the components as defined in Swift Testing Policy

Full Access
Question # 26

What is the purpose of a SWIFT HSM? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

To encrypt the database of the messaging interface

B.

To store PKI certificates

C.

To connect to the SWIFT Secure IP Network (SIPN)

D.

To format the FIN MT messages

Full Access
Question # 27

The Swift user would like to perform their CSP assessment in May for the CSCF version that will only be active as from July the same year. Is it allowed?

A.

No, an assessment can only be done on the active version of the CSCF

B.

Yes, the assessment on a particular version can start before the actual activation date

Full Access
Question # 28

Which statements are true of Alliance Messaging Hub (AMH)? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

AMH is highly resilient, and can consist of multiple instances and sites in parallel

B.

AMH provides advanced integration capabilities

C.

AMH is a messaging interface able to connect to other financial networks, not only SWIFT

D.

All of the above

Full Access
Question # 29

What does SWIFT provide? (Select the two correct answers that apply)

A.

A platform for messaging

B.

Standards for communicating

C.

Hosting for financial institutions

D.

A high-level programming language

Full Access
Question # 30

From the outsourcing agent diagram, which components in the diagram are in scope and applicable for the Swift user.

A.

Components A, B, C, D and E

B.

Components A and B

C.

Components C, D and E

D.

None of the above

Full Access
Question # 31

Is the restriction of Internet access only relevant when having SWIFT-related components in a secure zone?

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

A.

Yes, because if there is no secure zone, then the internet connectivity does not need to be restricted

B.

No, because there can be in-scope general operator PCs used to access a SWIFT-related application hosted at a service provider

Full Access
Question # 32

Select the correct statement about Alliance Gateway.

A.

It is used to exchange messages over the Swift network

B.

It is used to create messages to send over the Swift network

Full Access
Question # 33

The SWIFT PKI certificates are used for… (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

Asymmetric signing and encryption end to end

B.

Asymmetric signing and encryption end to SWIFT only

C.

Symmetric encryption only

D.

Asymmetric signing only

Full Access
Question # 34

The internet connectivity restriction control prevents having internet access on any CSCE m-scope components.

A.

TRUE

B.

FALSE

Full Access