Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Swift CSP-Assessor Customer Security Programme Assessor Certification(CSPAC) Exam Practice Test

Demo: 34 questions
Total 116 questions

Customer Security Programme Assessor Certification(CSPAC) Questions and Answers

Question 1

How are online SwiftNet Security Officers authenticated? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Via their PKI certificate

B.

Via their swift.com account and secure code card

C.

Via their swift.com account

Question 2

A Treasury Management System (TMS) application is installed on the same machine as the customer connector (such as MQ server) connecting towards a Service Bureau Are these applications/systems in scope of CSCF?

Options:

A.

The TMS application, the MQ server and hosting system are in the scope of the CSCF and must be placed in a secure zone

B.

The TMS application, the MQ server and hosting system enters the scope of the CSCF advisory and should be placed in a secure zone

C.

Only the MO server application is in scope of the CSCF> The TMS application is considered as back-office

D.

The TMS application is the highest risk and must be secured appropriately. The MQ server should be secured on a best effort basis

Question 3

Select the environment that is not in scope in a SWIFT user CSP assessment (assuming the environments are separated).

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

SWIFT infrastructure (sometimes known as Live)

B.

Development

C.

Disaster Recovery

D.

Cold backup systems

Question 4

What are the three main objectives of the Customer Security Controls Framework? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

Options:

A.

1. Secure your environment

2. Know and Limit Access

3. Detect and Respond

B.

1. Restrict Internet Access and Protect Critical Systems from General IT Environment

2. Reduce Attack Surface and Vulnerabilities

3. Physically Secure the Environment

C.

1. Secure and Protect

2. Prevent and Detect

3. Share and Prepare

D.

1. Raise pragmatically the security bar

2. Maintain appropriate cyber-security hygiene

3. React promptly

Question 5

What is expected regarding Token Management when (physical or software-based) tokens are used? (Choose all that apply.)

Options:

A.

Similar to user accounts, individual assignment and ownership for accurate traceability and revocation in case of potential tampering, loss or in case of user role change

B.

Have in place a strict token assignment process. This avoids the need to perform g a regular review of assigned tokens

C.

Individuals must not share their tokens. Tokens must remain under the control and supervision of its owner

D.

All tokens must be stored in a safe when not used

Question 6

The Physical Security protection control is also aimed at protecting the “on call” and “working from home” employees’ equipment used to access the Swift-related components.

Options:

A.

TRUE

B.

FALSE

Question 7

What must a Swift user implement to comply with a CSCF security control?

Options:

A.

A solution that maps the implementation guidelines described for a controls in scope components

B.

A solution that meets the control objectives and addresses the risk drivers for the in scope components)

Question 8

In an entity having a small infrastructure and only 2 operators, the HR manager explains in a short interview how the security training is implemented providing one example. Would it be acceptable?

Options:

A.

Yes. it's a risk based testing approach this can be enough in this case

B.

No. more evidence are required

Question 9

The SWIFT user’s first line of defence has performed a detailed self-assessment demonstrating an adequate compliance level to each of the applicable controls. As an assessor, may I fully rely on this analysis if the SWIFT user can demonstrate that their conclusion was based on a valid testing approach? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Yes

B.

Yes, but only if the CISO signs the completion letter at the end of the assessment

C.

No, even if it could support the compliance level, additional testing will always be required by the independent assessor to confirm a controls compliance level

D.

No, except if the SWIFT user’s chief auditor approves this approach

Question 10

Can an assessor re-use an ISAE 3000 report dating back 2 years to support an independent assessment?

Options:

A.

No, that is too old, the maximum is 18 months

B.

Yes, there is no time limit for an iSAE 3000 report

C.

No, the SAE 3000 report is no validsurrogateas a rule

D.

Yes, provided there is no change to the Swift user's infrastructure

Question 11

What is the purpose of the High-Level Test Plan (HLTP) provided by SWIFT? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

The HLTP provides a way of testing and the typical evidence for each control (based on implementation guidelines) and must be strictly followed

B.

The HLTP provides a way of testing and the typical evidence for each control (based on implementation guidelines), testing should be ideally based on it

C.

The HLTP provides the rules to define the sample for testing

D.

The HLTP provides a detailed way of control testing

Question 12

What is the purpose of a SWIFT HSM? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

To encrypt the database of the messaging interface

B.

To store PKI certificates

C.

To connect to the SWIFT Secure IP Network (SIPN)

D.

To format the FIN MT messages

Question 13

Which authentication methods are possible on the Alliance Interfaces? (Choose all that apply.)

Options:

A.

Password

B.

LDAP Authentication

C.

Radius One-time password

D.

Password and TOTP

Question 14

What are the possible impacts for a SWIFT user to be non-compliant to CSP? (Select the two correct answers that apply)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

To be reported to their supervisors (if applicable)

B.

To be seen as non-compliant to their counterparts in KYC-SA

C.

To be contacted by SWIFT to provide the CSP assessment report and detailed information about the reason of non-compliance

D.

To be delisted from the BIC directory

Question 15

A Treasury Management System (TMS) application is installed on the same machine as the customer connector, connecting to a Service Bureau. Are these applications/systems in scope of CSCF? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

The TMS application, the customer connector, and the hosting system are in the scope of the CSCF

B.

Only the customer connector application is in scope of the CSCF. The TMS application is a back-office

C.

The TMS application is the highest risk and must be secured appropriately. The customer connector should be secured on a best effort basis

D.

The TMS application, the customer connector, and the hosting system are in scope only if they connect directly to SWIFT, not towards a Service Bureau

Question 16

Which of the following statements best describe valid implementations when implementing control 2.9 Transaction Business Controls? (Choose all that apply.)

Options:

A.

Multiple measures must be implemented by the Swift user to validate the flows of transactions are in the bounds of the normal expected business

B.

A customer designed implementation or a combination of different measures are deemed valid if they sufficiently mitigate the control risks

C.

Reliance on a recent business assessment or regulator response confirming the effectiveness of the control (as an example CPMI's_ requirement) is especially poignant to this control

D.

Any solutions is acceptable so long as the CISO approves the implementation

Question 17

A Swift user has remediated an exception reported by the assessor. What are their obligations before updating and submitting an attestation reflecting the new compliance level?

Options:

A.

The exception must be re-assessed by an independent assessor. The assessor can be different to the one who initially raised the exception

B.

The exception must be re-assessed by the same independent assessor that raised the exception

C.

The first line of defense can confirm their level of compliance using a self-assessment approach

D.

None, if the remediation has been completed, a new attestation can be submitted reflecting the compliance of the control

Question 18

Intrusion Detection Control can be met through the following technology. (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

Options:

A.

NIDS

B.

HIDS

C.

EDR and XDR

D.

A combination of all of the above

Question 19

The SWIFT HSM Box must be hardened at the system level by the SWIFT user owning the equipment.

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

TRUE

B.

FALSE

Question 20

In the case that nothing has changed in the SWIFT user’s infrastructure, is it possible to rely on a previous Independent assessment report without performing another independent assessment? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Yes, full reliance can be provided without the need of an independent assessment if nothing has changed

B.

No, even if nothing has changed, an independent assessor needs to assess the conditions before being able to rely on the previous year’s assessment

C.

No, even if nothing has changed, an independent assessor needs to perform a full assessment including full testing every year

D.

Yes, full reliance can be provided if the CISO of the SWIFT user signs a letter which confirms that nothing has changed

Question 21

Penetration testing must be performed at application level against the Swift-related components, such as the interfaces, Swift and customer connectors?

Options:

A.

True, those are key components

B.

False, only the components as defined in Swift Testing Policy

Question 22

The SWIFT PKI certificates are used for… (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Asymmetric signing and encryption end to end

B.

Asymmetric signing and encryption end to SWIFT only

C.

Symmetric encryption only

D.

Asymmetric signing only

Question 23

The messaging operator in Alliance Lite2… (Select the two correct answers that apply)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Can create and modify messages

B.

Can assign RBAC roles to RMA operators and messaging operators

C.

Can approve the Customer Security Officer change requests

D.

Can approve messages

Question 24

May an assessor rely on an ISAE 3000 report dating back 2 years to support a CSP independent assessment? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

No, that is too old, the maximum is 18 months

B.

Yes, there is no time limit for an ISAE 3000 report

C.

No, an ISAE 3000 report is no valid substitute as a rule

D.

Yes, provided there is no change to the SWIFT user’s infrastructure

Question 25

Which of the following infrastructures has the smallest SWIFT footprint? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Full stack of products up to the Messaging Interface

B.

Alliance Remote Gateway

C.

Lite 2 or Alliance Cloud

D.

A user with a Messaging Interface behind a Service Bureau

Question 26

Which ones are Alliance Lite2 key components? (Choose all that apply.)

Options:

A.

A web interface

B.

An AutoClient

C.

A HSM box

D.

A WebSphere MQ Server

Question 27

For which reasons (as per the "CSP Independent Assessment Process for Assessors Guidelines") is it required to keep minutes of all key meetings related to a CSP assessment process (examples: kick-off, scope definition, exit meeting)? (Select all answers that apply)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

To support quality review (audit) processes

B.

For documentation purpose

C.

To keep key information that can be used as input for the next step in the assessment process

D.

To be uploaded in KYC-SA at the end of the assessment (mandated by SWIFT)

Question 28

Must all CSCF controls be subject to an assessment? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Yes

B.

No, only the mandatory controls

C.

No, only the attested controls (with as a minimum the mandatory ones according to the architecture type)

D.

No, the controls selection is agreed upfront between the SWIFT User and the assessor

Question 29

Alliance Lite2 only supports the sending and receiving of FIN messages.

Options:

A.

TRUE

B.

FALSE

Question 30

What are the conditions required to allow reliance on the compliance conclusion of a control assessed in the previous year? (Select all answers that apply)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

The control compliance conclusion must have already been relied on the past two years

B.

The previous assessment was performed on the CSCF version of the previous year (at least)

C.

The control definition has not changed

D.

The control design and implementation are the same

Question 31

Is the restriction of Internet access only relevant when having Swift-related components in a secure zone?

Options:

A.

Yes, because if there is no secure zone then the internet connectivity does not need to be restricted

B.

No, because there can be in-scope general operator PCs used to access a Swift-related application hosted at a service provider

Question 32

Which statements are correct about the Alliance Access LSO and RSO? (Select the two correct answers that apply)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

They are Alliance Security Officers

B.

Their PKI certificates are stored either on an HSM Token or on an HSM-box

C.

They are the business profiles that can sign the SWIFT financial transactions

D.

They are responsible for the configuration and management of the security functions in the messaging interface

Question 33

A SWIFT user owns a customer connector and a communication interface. What architecture type is the SWIFT user? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

A1

B.

A2

C.

A3

D.

A4

Question 34

To rely on a previous CSP assessment report conclusions, a limited testing approach was used. What is the expected sample size as per the High-Level Test Plan (HLTP) guidelines for each identified component? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

There is no need for a sample for this limited testing

B.

1

C.

3

D.

5

Demo: 34 questions
Total 116 questions