Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Swift CSP-Assessor Customer Security Programme Assessor Certification(CSPAC) Exam Practice Test

Page: 1 / 12
Total 116 questions

Customer Security Programme Assessor Certification(CSPAC) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which statements are true of Alliance Messaging Hub (AMH)? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

AMH is highly resilient, and can consist of multiple instances and sites in parallel

B.

AMH provides advanced integration capabilities

C.

AMH is a messaging interface able to connect to other financial networks, not only SWIFT

D.

All of the above

Question 2

The Physical Security protection control is also aimed at protecting the “on call” and “working from home” employees’ equipment used to access the Swift-related components.

Options:

A.

TRUE

B.

FALSE

Question 3

Select the environment that is not in scope in a SWIFT user CSP assessment (assuming the environments are separated).

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

SWIFT infrastructure (sometimes known as Live)

B.

Development

C.

Disaster Recovery

D.

Cold backup systems

Question 4

The SwiftNet Link (SNL) software is always required for the Swift Alliance Gateway to operate.

SIL Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

TRUE

B.

FALSE

Question 5

The Internal Audit and an external assessment company are both involved in a SWIFT user’s assessment. Both have shared control assessments to cover the full scope (meaning two separate assessment teams). Who needs to provide a completion letter? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

The Internal audit lead assessor and the external company lead assessor

B.

The Internal audit lead assessor only

C.

The External company lead assessor only

D.

None of them, it is not required when an internal department was involved in the assessment

Question 6

Which user roles are available in Alliance Cloud by default. (Choose all that apply.)

Options:

A.

Role and Operator management

B.

Message Management

C.

Administrator

D.

Message Security Administrator

Question 7

Select the correct statement(s) about the Swift Alliance Gateway. (Choose all that apply.)

Options:

A.

It acts as the single window to SwiftNet messaging services byconcentratingyour traffic flows

B.

It allows sharing of PKI profiles between application or individuals, through the use of virtual profiles

C.

It allows the creation and/or modification of some Swift messages (depending on the types &/or formats)

D.

The Alliance Gateway can only be accessed by a SWIFTNet user

Question 8

An application only uses (i) the SWIFT API for reporting and gpi basic tracker calls through (ii) a tailored account not allowing business transactions management. Is this application in scope of the CSCF? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Yes, it is in scope and considered a customer connector because it reads business transaction data

B.

No, it can be descoped because there is no business transaction management being performed

C.

No, it is not in scope because the API connection method is not in scope of the CSP

D.

Yes, it is in scope because the API connection method is less secure than SWIFT interfaces

Question 9

Which statements are correct about the Alliance Access LSO and RSO? (Select the two correct answers that apply)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

They are Alliance Security Officers

B.

Their PKI certificates are stored either on an HSM Token or on an HSM-box

C.

They are the business profiles that can sign the SWIFT financial transactions

D.

They are responsible for the configuration and management of the security functions in the messaging interface

Question 10

Which of the following statements best describes the difference between an audit and an assessment as per SWIFT CSP definitions? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

An audit is a comprehensive review of a customer’s controls to ensure they meet regulatory requirements, while an assessment is a very high-level review of controls to identify potential weaknesses

B.

An audit looks at the defined controls design and implementation compliance and follows recognized international audit standards, whereas an assessment is less strict but aims the same common objectives

C.

An audit is a one-time event, while an assessment is an ongoing process of monitoring and improving security controls

D.

An audit and an assessment can be used interchangeably

Question 11

From the outsourcing agent diagram, which components in the diagram are in scope and applicable for the Swift user.

Options:

A.

Components A, B, C, D and E

B.

Components A and B

C.

Components C, D and E

D.

None of the above

Question 12

Must Swift users submit a copy of their final assessment report to Swift?

Options:

A.

Yes, all documents produced from the assessment must be provided proactively to Swift

B.

No, it is not required to provide Swift with any documents by default. However, Swift can request a copy of the Assessment completion letter

C.

Yes, a copy of (only) the assessment report must be provided to Swift, no other documents

D.

Yes, in cases where a customer performs an Independent assessment rather than an audit then a copy of the assessment report must be provided. However, it is not required for the Swift user to provide any forms when an Internal/External Audit is performed

Question 13

Who can connect to SWIFT? (Select all answers that apply)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Financial institutions, such as banks and securities broker-dealers

B.

Individuals who use online banking for international transfers

C.

Market infrastructures that provide financial institutions with centralized transaction processing

D.

Corporates that work with multiple banking partners

Question 14

May an assessor rely on an ISAE 3000 report dating back 2 years to support a CSP independent assessment? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

No, that is too old, the maximum is 18 months

B.

Yes, there is no time limit for an ISAE 3000 report

C.

No, an ISAE 3000 report is no valid substitute as a rule

D.

Yes, provided there is no change to the SWIFT user’s infrastructure

Question 15

Where is the implementation of multi-factor authentication deemed sufficient to support control 4.2 compliance? (Choose all that apply.)

Options:

A.

When accessing an outsourcing agent or an L2BA Swift-related application

B.

When logging-in on an interface, a connector, or the system running such component

C.

When login on the jump server filtering access to local Swift secure zone

D.

On the General Operator PC used to access a Swift-related component

Question 16

In a fully on-premises infrastructure, which security management profile is not involved? (Select the one correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Alliance Security Officer (LSO/RSO)

B.

HSM Administrator

C.

swift.com Administrator

D.

Customer Security Officer

Question 17

The SwiftNet Link (SNL) software is always required for the Swift Alliance Gateway to operate.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

TRUE

B.

FALSE

Question 18

The cluster of VPN boxes is also called managed-customer premises equipment (M-CPE).

Options:

A.

TRUE

B.

FALSE

Question 19

In the illustration, identify the component type of each of the numbered components.

Options:

A.

1. Customer Connector

2. Bridging Server (Middleware Server)

3. Customer Connector

4. Bridging Server (Middleware Server)

B.

1. Customer Connector

2. Bridging Server (Middleware Server)

3. Customer Connector

4. Customer Connector

C.

1. Bridging Server (Middleware Server)

2. Bridging Server (Middleware Server)

3. Bridging Server (Middleware Server)

4. Bridging Server (Middleware Server)

D.

1. Customer Connector

2. Customer Connector

3. Customer Connector

4. Customer Connector

Question 20

What type of control effectiveness needs to be validated for an independent assessment?

Options:

A.

Effectiveness is never validated only the control design

B.

An independent assessment is a point in time review with possible reviews of older evidence as appropriate

C.

Operational effectiveness needs to be validated

D.

None of the above

Question 21

Is it mandated to perform security awareness and other specific trainings every year for individuals with SWIFT-critical roles? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

Options:

A.

Yes, and a track record must show that both awareness and specific training are performed annually

B.

No, both awareness and specific trainings are planned when deemed required

C.

No, awareness training expected to be performed yearly; specific training to maintain the required knowledge only when needed

D.

No, a track record must show that both awareness and specific training are performed at least bi-yearly (every 2 years)

Question 22

Which encryption methods are used to secure the communications between the SNL host and HSM boxes?

Options:

A.

NTLS and SSH

B.

Telnet and SSL

C.

NTLS and Telnet

D.

MPLS and SSL

Question 23

A Swift user relies on a sFTP server to connect through an externally exposed connection with a service provider or a group hub What architecture type is the Swift user? (Choose all that apply.)

Options:

A.

A1

B.

A2

C.

A3

D.

A4

Question 24

In an entity having a small infrastructure and only 2 operators, the HR manager explains in a short interview how the security training is implemented providing one example. Would it be acceptable?

Options:

A.

Yes. it's a risk based testing approach this can be enough in this case

B.

No. more evidence are required

Question 25

A Swift user has moved from one Service Bureau to another What are the obligations of the Swift user in the CSP context?

Options:

A.

To inform the SB certification office at Swift WW

B.

To reflect that in the next attestation cycle

C.

None if there is no impact in the architecture tope

D.

To submit an updated attestation reflecting this change within 3 months

Question 26

Which of the following infrastructures has the smallest Swift footprint?

Options:

A.

Full stack of products up to the Messaging Interface

B.

Alliance Remote Gateway

C.

Alliance Lite2

D.

Full stack of products includinq IPLA

Question 27

Which authentication methods are possible on the Alliance Interfaces? (Choose all that apply.)

Options:

A.

Password

B.

LDAP Authentication

C.

Radius One-time password

D.

Password and TOTP

Question 28

For each of the following setups, the responsible party is identified to protect the virtualization or cloud underlying platform. Which one of the combinations is not correct?

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

For on-premises virtualization platform: by the platform provider

B.

For virtualization platform deployed at a third party on which user’s SWIFT-related components are virtually hosted: by the third party

C.

For on-premises container platform: by the SWIFT user

D.

For Cloud Provider: the cloud provider

Question 29

Can an internal audit department submit and approve their SWIFT user’s attestation on the KYC-SA SWIFT portal? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Yes, providing this is agreed by the head of IT operations and the CISO

B.

No, this is never an option

C.

Yes, an internal auditor can submit the attestation for approval provided they have the appropriate credentials for swift.com. The CISO remains in charge of the approval of the attestation

D.

Yes, with approval from the Chief Auditor

Question 30

Which operator session flows are expected to be protected in terms of confidentiality and integrity? (Choose all that apply.)

Options:

A.

System administrator sessions towards a host running a Swift related component

B.

All sessions to and from a jump server used to access a component in a secure zone

C.

All sessions towards a secure zone (on-premises or hosted by a third-party or a Cloud Provider)

D.

All sessions towards a Swift related application run by an Outsourcing Agent, a Service Bureau or an L2BA Provider

Question 31

In the illustration, identify which components are in scope of the CSCF? (Choose all that apply.)

Options:

A.

Components A, B, K

B.

Components J, K, I

C.

Components F, G, H

D.

Components C, E, M

Question 32

What type of keys does the HSM box store? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Private keys

B.

Public keys

C.

Both private and public keys

Question 33

Select the correct statement(s).

Options:

A.

The public and private keys of a Swift certificate are stored on the Hardware Security Module

B.

The certificate stored on the Swift Hardware Security Module is used during the decryption operation of a message

C.

The decryption operation uses the encryption private key of the receiver

D.

To verify the signature the SwiftNetLink uses the signing private key of the receiver

Question 34

A Swift user has remediated an exception reported by the assessor. What are their obligations before updating and submitting an attestation reflecting the new compliance level?

Options:

A.

The exception must be re-assessed by an independent assessor. The assessor can be different to the one who initially raised the exception

B.

The exception must be re-assessed by the same independent assessor that raised the exception

C.

The first line of defense can confirm their level of compliance using a self-assessment approach

D.

None, if the remediation has been completed, a new attestation can be submitted reflecting the compliance of the control

Page: 1 / 12
Total 116 questions