Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Swift > Customer Security Programme (CSP) > CSP-Assessor

CSP-Assessor Customer Security Programme Assessor Certification(CSPAC) Question and Answers

Question # 4

A Swift user has moved from one Service Bureau to another What are the obligations of the Swift user in the CSP context?

A.

To inform the SB certification office at Swift WW

B.

To reflect that in the next attestation cycle

C.

None if there is no impact in the architecture tope

D.

To submit an updated attestation reflecting this change within 3 months

Full Access
Question # 5

Which statement(s) is/are correct about the LSO/RSO accounts on a Swift Alliance Access? (Choose all that apply.)

A.

They are local Security Officers

B.

Their PKI certificates are stored either on a HSM Token or on a HSM-box

C.

They are the business profiles that can sign the Swift financial transactions

D.

They are responsible for the configuration and management of the security functions of the server

Full Access
Question # 6

Which of the following infrastructures has the smallest Swift footprint?

A.

Full stack of products up to the Messaging Interface

B.

Alliance Remote Gateway

C.

Alliance Lite2

D.

Full stack of products includinq IPLA

Full Access
Question # 7

The SwiftNet Link (SNL) software is always required for the Swift Alliance Gateway to operate.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

TRUE

B.

FALSE

Full Access
Question # 8

Select the supporting documents to conduct a CSP assessment. (Choose all that apply.)

A.

The CSP User Handbook

B.

The mapping to industry standards article

C.

The Controls Matrix and High Level Test P an

D.

The Customer Security Controls Framework

Full Access
Question # 9

Is the restriction of Internet access only relevant when having Swift-related components in a secure zone?

A.

Yes, because if there is no secure zone then the internet connectivity does not need to be restricted

B.

No, because there can be in-scope general operator PCs used to access a Swift-related application hosted at a service provider

Full Access
Question # 10

A Swift user uses an application integrating a sFTP client to push files to a service bureau sFTP server What architecture type is the Swift user? (Choose all that apply.)

A.

A1

B.

B

C.

A3

D.

A4

Full Access
Question # 11

May an assessor rely on an ISAE 3000 report dating back 2 years to support a CSP independent assessment? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

No, that is too old, the maximum is 18 months

B.

Yes, there is no time limit for an ISAE 3000 report

C.

No, an ISAE 3000 report is no valid substitute as a rule

D.

Yes, provided there is no change to the SWIFT user’s infrastructure

Full Access
Question # 12

Select the correct statement about Alliance Gateway.

A.

It is used to exchange messages over the Swift network

B.

It is used to create messages to send over the Swift network

Full Access
Question # 13

Intrusion Detection Control can be met through the following technology. (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

A.

NIDS

B.

HIDS

C.

EDR and XDR

D.

A combination of all of the above

Full Access
Question # 14

As a SWIFT CSP Certified Assessor, my external cybersecurity certification (example: CISA) has expired. Am I still allowed to work as a certified assessor?

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

No, a valid external cybersecurity certification is mandatory to keep the CSP Certified Assessor certification

B.

Yes, if the SWIFT CSP Assessor certification is still valid

Full Access
Question # 15

Alliance Lite2 only supports the sending and receiving of FIN messages.

A.

TRUE

B.

FALSE

Full Access
Question # 16

The Alliance Access OS administrator can create and send financial messages.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

TRUE

B.

FALSE

Full Access
Question # 17

Is it mandated to perform security awareness and other specific trainings every year for individuals with SWIFT-critical roles? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

A.

Yes, and a track record must show that both awareness and specific training are performed annually

B.

No, both awareness and specific trainings are planned when deemed required

C.

No, awareness training expected to be performed yearly; specific training to maintain the required knowledge only when needed

D.

No, a track record must show that both awareness and specific training are performed at least bi-yearly (every 2 years)

Full Access
Question # 18

What does the CSCF expect in terms of Database Integrity? (Choose all that apply.)

A.

Nothing is needed when the messaging or connector integrates/embeds an integrity check functionality at each Swift transaction record level.

B.

When a database is used by a messaging interface or connector, the related hosted database and its supporting system must be protected as a Swift-related component and exceptions alerted

C.

Alerts generated from performed integrity checks are captured and analysed for appropriate treatment

Full Access
Question # 19

In an entity having a small infrastructure and only 2 operators, the HR manager explains in a short interview how the security training is implemented providing one example. Would it be acceptable?

A.

Yes. it's a risk based testing approach this can be enough in this case

B.

No. more evidence are required

Full Access
Question # 20

How are online SwiftNet Security Officers authenticated?

A.

Via their PKI certificate

B.

Via their swift.com account and secure code card

C.

Via their swift.com account

Full Access
Question # 21

A Treasury Management System (TMS) application is installed on the same machine as the customer connector (such as MQ server) connecting towards a Service Bureau Are these applications/systems in scope of CSCF?

A.

The TMS application, the MQ server and hosting system are in the scope of the CSCF and must be placed in a secure zone

B.

The TMS application, the MQ server and hosting system enters the scope of the CSCF advisory and should be placed in a secure zone

C.

Only the MO server application is in scope of the CSCF> The TMS application is considered as back-office

D.

The TMS application is the highest risk and must be secured appropriately. The MQ server should be secured on a best effort basis

Full Access
Question # 22

Can an internal audit department submit and approve their SWIFT user’s attestation on the KYC-SA SWIFT portal? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

Yes, providing this is agreed by the head of IT operations and the CISO

B.

No, this is never an option

C.

Yes, an internal auditor can submit the attestation for approval provided they have the appropriate credentials for swift.com. The CISO remains in charge of the approval of the attestation

D.

Yes, with approval from the Chief Auditor

Full Access
Question # 23

Which statements are true of Alliance Messaging Hub (AMH)? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

AMH is highly resilient, and can consist of multiple instances and sites in parallel

B.

AMH provides advanced integration capabilities

C.

AMH is a messaging interface able to connect to other financial networks, not only SWIFT

D.

All of the above

Full Access
Question # 24

A SWIFT user is not based in the same country as the assessor. The assessor would like to perform the assessment remotely. Is this permitted? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

Remote assessments are not permitted under any circumstances

B.

This is permitted provided the same level of comfort can be guaranteed

C.

It is possible to perform an assessment remotely only with valid reasons. These reasons must be formally validated by SWIFT CSP office

D.

It is not allowed to conduct an assessment remotely under any circumstances. However, force majeure circumstances like the global pandemic are an exception to this

Full Access
Question # 25

The objective of the Customer Environment Protection control is to separate the user's Swift infrastructure which restricts malicious access from the external world and from the General IT environment of the Swift user.

A.

TRUE

B.

FALSE

Full Access
Question # 26

The Swift user has an sFTP server to push files to an outsourcing agent hosting the Swift users own Communication interface. What is their architecture type?

A.

A1

B.

B

C.

A3

D.

A4

Full Access
Question # 27

In the illustration, identify which components are in scope of the CSCF? (Choose all that apply.)

A.

Components A, B, K

B.

Components J, K, I

C.

Components F, G, H

D.

Components C, E, M

Full Access
Question # 28

Can an internal audit department submit and approve their Swift user's attestation on the KYC-SA Swift portal?

A.

Yes, providing this is agreed by the head of IT operations and the CISO

B.

No, this is never an option

C.

Yes, an internal auditor can submit the attestation for approval provided they have the appropriate credentials for switt.com. The CISO remains in charge of the approval of the attestation

D.

Yes, with approval from the Chief auditor

Full Access
Question # 29

The SWIFT PKI certificates are used for… (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

Asymmetric signing and encryption end to end

B.

Asymmetric signing and encryption end to SWIFT only

C.

Symmetric encryption only

D.

Asymmetric signing only

Full Access
Question # 30

The Internal Audit and an external assessment company are both involved in a SWIFT user’s assessment. Both have shared control assessments to cover the full scope (meaning two separate assessment teams). Who needs to provide a completion letter? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

The Internal audit lead assessor and the external company lead assessor

B.

The Internal audit lead assessor only

C.

The External company lead assessor only

D.

None of them, it is not required when an internal department was involved in the assessment

Full Access
Question # 31

The Physical Security protection control is also aimed at protecting the “on call” and “working from home” employees’ equipment used to access the Swift-related components.

A.

TRUE

B.

FALSE

Full Access
Question # 32

A SWIFT user owns a customer connector and a communication interface. What architecture type is the SWIFT user? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

A1

B.

A2

C.

A3

D.

A4

Full Access
Question # 33

How are online SwiftNet Security Officers authenticated? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

Via their PKI certificate

B.

Via their swift.com account and secure code card

C.

Via their swift.com account

Full Access
Question # 34

Select the environment that is not in scope in a SWIFT user CSP assessment (assuming the environments are separated).

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

SWIFT infrastructure (sometimes known as Live)

B.

Development

C.

Disaster Recovery

D.

Cold backup systems

Full Access