Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Swift Customer Security Programme (CSP) CSP-Assessor Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CSP-Assessor Premium Access

View all detail and faqs for the CSP-Assessor exam


503 Students Passed

89% Average Score

94% Same Questions
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

Select the supporting documents to conduct a CSP assessment. (Choose all that apply.)

Question # 1

Options:

A.

The CSP User Handbook

B.

The mapping to industry standards article

C.

The Controls Matrix and High Level Test P an

D.

The Customer Security Controls Framework

Questions # 2:

What are the key elements that usually need to be considered by a cloud provider in an IaaS cloud model? (Select the two correct answers that apply)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

The cloud provider must cover all CSCF controls applicable to the related in-scope components for which the cloud provider is responsible (such as the underlying infrastructure in line with appendix G)

B.

The cloud provider must give comfort of control implementation effectiveness on the virtualization layer hosting the SWIFT users' components

C.

The cloud provider must give full assurance on the change management process of the SWIFT-users' components/applications deployed by the user

D.

The cloud provider must give comfort regarding the resiliency put in place to ensure continuity of SWIFT connectivity service

Questions # 3:

Penetration testing must be performed at application level against the Swift-related components, such as the interfaces, Swift and customer connectors?

Question # 3

Options:

A.

True, those are key components

B.

False, only the components as defined in Swift Testing Policy

Questions # 4:

The Swift user has an sFTP server to push files to an outsourcing agent hosting the Swift users own Communication interface. What is their architecture type?

Question # 4

Options:

A.

A1

B.

B

C.

A3

D.

A4

Questions # 5:

Compliance to 2.9 Transaction Business Controls can be obtained through different ways. Which of the following one does not ensure compliance?

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

More than one of the measures proposed in the implementation guidelines are implemented

B.

A customer-designed implementation that encounters the control objective and addresses the risk driver

C.

Reliance on a recent business assessment or regulator response confirming effectiveness of the existing control

D.

Any implementation if approved by the CIO

Questions # 6:

An application only uses (i) the SWIFT API for reporting and gpi basic tracker calls through (ii) a tailored account not allowing business transactions management. Is this application in scope of the CSCF? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Yes, it is in scope and considered a customer connector because it reads business transaction data

B.

No, it can be descoped because there is no business transaction management being performed

C.

No, it is not in scope because the API connection method is not in scope of the CSP

D.

Yes, it is in scope because the API connection method is less secure than SWIFT interfaces

Questions # 7:

What type of keys does the HSM box store? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Private keys

B.

Public keys

C.

Both private and public keys

Questions # 8:

To verify the applicability of a CSCF control to a specific component, several actions may be considered. Which one does not apply in this case?

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Check in the CSP Policy document

B.

Check appendix F of the CSCF

C.

Check carefully the Introduction section of the CSCF

D.

Open a case with SWIFT support via the case manager on swift.com if further information or solution cannot be found in the documentation

Questions # 9:

What are the conditions required to permit reliance on the compliance conclusion of a control assessed in the previous year? (Choose all that apply.)

Question # 9

Options:

A.

The control compliance conclusion must have already been relied on the past two years

B.

The previous assessment was performed on the (correct) CSCF version of the previous year

C.

The control definition has not changed

D.

The control-design and implementation are the same

Questions # 10:

Who can connect to SWIFT? (Select all answers that apply)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Financial institutions, such as banks and securities broker-dealers

B.

Individuals who use online banking for international transfers

C.

Market infrastructures that provide financial institutions with centralized transaction processing

D.

Corporates that work with multiple banking partners

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.