Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CSP-Assessor Exam Dumps - Swift Customer Security Programme (CSP) Questions and Answers

Question # 24

There are open exceptions leading to multiple CSP controls being non-compliant. How should the SWIFT user proceed? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

The user must remediate all the exceptions within 3 months before submitting the CSP attestation in KYC-SA

B.

The SWIFT user may remediate the exceptions and then re-submit an attestation reflecting the new compliance status, but only after compliance validation by the same independent assessor

C.

The SWIFT user may remediate the exceptions and re-submit an updated attestation reflecting the new compliance status but only after compliance validation by an independent assessor

D.

The attestation cannot be submitted before all exceptions are resolved

Buy Now
Question # 25

The SwiftNet Link (SNL) software is always required for the Swift Alliance Gateway to operate.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

TRUE

B.

FALSE

Buy Now
Question # 26

What does the CSCF expect in terms of Database Integrity? (Select the two correct answers that apply)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

Options:

A.

Nothing is further expected when the messaging interface or connector integrates/embeds an integrity check functionality at each SWIFT transaction record level

B.

When a database is used by a messaging interface or connector, the related hosted database and its supporting system is expected to be protected as a SWIFT-related component, the identified exceptions alerted and followed-up

C.

Alerts generated from performed integrity checks are captured and analyzed for appropriate treatment

Buy Now
Question # 27

The SWIFT user has a local communication interface as their main channel to SWIFT. For contingency, the SWIFT user also has a connector as a backup channel. What is the architecture type for this SWIFT user? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift CSP Assessment Report Template

Options:

A.

A1

B.

A2

C.

A3

D.

A4

Buy Now
Question # 28

What is expected regarding Token Management when (physical or software-based) tokens are used? (Choose all that apply.)

Options:

A.

Similar to user accounts, individual assignment and ownership for accurate traceability and revocation in case of potential tampering, loss or in case of user role change

B.

Have in place a strict token assignment process. This avoids the need to perform g a regular review of assigned tokens

C.

Individuals must not share their tokens. Tokens must remain under the control and supervision of its owner

D.

All tokens must be stored in a safe when not used

Buy Now
Question # 29

Is the restriction of Internet access only relevant when having Swift-related components in a secure zone?

Options:

A.

Yes, because if there is no secure zone then the internet connectivity does not need to be restricted

B.

No, because there can be in-scope general operator PCs used to access a Swift-related application hosted at a service provider

Buy Now
Question # 30

Which operator session flows are expected to be protected in terms of confidentiality and integrity? (Choose all that apply.)

Options:

A.

System administrator sessions towards a host running a Swift related component

B.

All sessions to and from a jump server used to access a component in a secure zone

C.

All sessions towards a secure zone (on-premises or hosted by a third-party or a Cloud Provider)

D.

All sessions towards a Swift related application run by an Outsourcing Agent, a Service Bureau or an L2BA Provider

Buy Now
Question # 31

Which of the following statements best describe valid implementations when implementing control 2.9 Transaction Business Controls? (Choose all that apply.)

Options:

A.

Multiple measures must be implemented by the Swift user to validate the flows of transactions are in the bounds of the normal expected business

B.

A customer designed implementation or a combination of different measures are deemed valid if they sufficiently mitigate the control risks

C.

Reliance on a recent business assessment or regulator response confirming the effectiveness of the control (as an example CPMI's_ requirement) is especially poignant to this control

D.

Any solutions is acceptable so long as the CISO approves the implementation

Buy Now
Question # 32

In a fully on-premises infrastructure, which security management profile is not involved? (Select the one correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Alliance Security Officer (LSO/RSO)

B.

HSM Administrator

C.

swift.com Administrator

D.

Customer Security Officer

Buy Now
Question # 33

When hesitant on the applicability of a CSCF control to a particular component? What steps should you take? (Choose all that apply.)

Options:

A.

Call your Swift contact

B.

Check appendix F of the CSCF

C.

Check carefully the Introduction section of the CSCF

D.

Open a case with Swift support via the case manager on swift com if further information or solution cannot be found in the documentation

Buy Now
Exam Code: CSP-Assessor
Exam Name: Customer Security Programme Assessor Certification(CSPAC)
Last Update: Apr 4, 2025
Questions: 116
CSP-Assessor pdf

CSP-Assessor PDF

$25.5  $84.99
CSP-Assessor Engine

CSP-Assessor Testing Engine

$28.5  $94.99
CSP-Assessor PDF + Engine

CSP-Assessor PDF + Testing Engine

$40.5  $134.99