Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Swift Customer Security Programme (CSP) CSP-Assessor Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CSP-Assessor Premium Access

View all detail and faqs for the CSP-Assessor exam


857 Students Passed

90% Average Score

95% Same Questions
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

What must a Swift user implement to comply with a CSCF security control?

Question # 21

Options:

A.

A solution that maps the implementation guidelines described for a controls in scope components

B.

A solution that meets the control objectives and addresses the risk drivers for the in scope components)

Questions # 22:

The Swift user would like to perform their CSP assessment in May for the CSCF version that will only be active as from July the same year. Is it allowed?

Question # 22

Options:

A.

No, an assessment can only be done on the active version of the CSCF

B.

Yes, the assessment on a particular version can start before the actual activation date

Questions # 23:

Using the outsourcing agent diagram, which components (including the components in SWIFT user premises) must be placed in a secure zone? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

•Next Service Provider(s)

•SWIFT User

•Outsourcing Agent(s)

•Connector*

•SWIFT

•SWIFT network

Options:

A.

Components A, B, and C

B.

All components

C.

Components A, C, D, and E

D.

Components A, C, and D

Questions # 24:

The Physical Security control also includes a regular review of physical access lists of the SWIFT-related servers' locations.

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

Options:

A.

TRUE

B.

FALSE

Questions # 25:

Must all CSCF controls be subject to an assessment?

Question # 25

Options:

A.

Yes

B.

No, only the mandatory controls

C.

No, only the attested controls (with as a minimum the mandatory ones]

D.

No, the control selection is defined between the Swift User and their assessor

Questions # 26:

A Swift user relies on a sFTP server to connect through an externally exposed connection with a service provider or a group hub What architecture type is the Swift user? (Choose all that apply.)

Question # 26

Options:

A.

A1

B.

A2

C.

A3

D.

A4

Questions # 27:

Which of the following infrastructures has the smallest Swift footprint?

Question # 27

Options:

A.

Full stack of products up to the Messaging Interface

B.

Alliance Remote Gateway

C.

Alliance Lite2

D.

Full stack of products includinq IPLA

Questions # 28:

Select the correct statement(s).

Question # 28

Options:

A.

The public and private keys of a Swift certificate are stored on the Hardware Security Module

B.

The certificate stored on the Swift Hardware Security Module is used during the decryption operation of a message

C.

The decryption operation uses the encryption private key of the receiver

D.

To verify the signature the SwiftNetLink uses the signing private key of the receiver

Questions # 29:

A Treasury Management System (TMS) application is installed on the same machine as the customer connector (such as MQ server) connecting towards a Service Bureau Are these applications/systems in scope of CSCF?

Question # 29

Options:

A.

The TMS application, the MQ server and hosting system are in the scope of the CSCF and must be placed in a secure zone

B.

The TMS application, the MQ server and hosting system enters the scope of the CSCF advisory and should be placed in a secure zone

C.

Only the MO server application is in scope of the CSCF> The TMS application is considered as back-office

D.

The TMS application is the highest risk and must be secured appropriately. The MQ server should be secured on a best effort basis

Questions # 30:

Is it necessary to formally explain to the Swift user the testing methodology that will be used for the CSP assessment during the kick-off?

Question # 30

Options:

A.

Yes

B.

No

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.