Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

CSP-Assessor Customer Security Programme Assessor Certification(CSPAC) Questions and Answers

Questions 4

There are open exceptions leading to multiple CSP controls being non-compliant. How should the SWIFT user proceed? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

The user must remediate all the exceptions within 3 months before submitting the CSP attestation in KYC-SA

B.

The SWIFT user may remediate the exceptions and then re-submit an attestation reflecting the new compliance status, but only after compliance validation by the same independent assessor

C.

The SWIFT user may remediate the exceptions and re-submit an updated attestation reflecting the new compliance status but only after compliance validation by an independent assessor

D.

The attestation cannot be submitted before all exceptions are resolved

Buy Now
Questions 5

Select the correct statement(s) about the Swift Alliance Gateway. (Choose all that apply.)

CSP-Assessor Question 5

Options:

A.

It acts as the single window to SwiftNet messaging services byconcentratingyour traffic flows

B.

It allows sharing of PKI profiles between application or individuals, through the use of virtual profiles

C.

It allows the creation and/or modification of some Swift messages (depending on the types &/or formats)

D.

The Alliance Gateway can only be accessed by a SWIFTNet user

Buy Now
Questions 6

Which ones are Alliance Lite2 key components? (Choose all that apply.)

CSP-Assessor Question 6

Options:

A.

A web interface

B.

An AutoClient

C.

A HSM box

D.

A WebSphere MQ Server

Buy Now
Questions 7

Can a Swift user choose to implement the security controls (example: logging and monitoring) in systems which are not directly in scope of the CSCE?

CSP-Assessor Question 7

Options:

A.

Yes

B.

No

Buy Now
Questions 8

What are the possible impacts for a SWIFT user to be non-compliant to CSP? (Select the two correct answers that apply)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

To be reported to their supervisors (if applicable)

B.

To be seen as non-compliant to their counterparts in KYC-SA

C.

To be contacted by SWIFT to provide the CSP assessment report and detailed information about the reason of non-compliance

D.

To be delisted from the BIC directory

Buy Now
Questions 9

What are the three main objectives of the Customer Security Controls Framework? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

Options:

A.

1. Secure your environment

2. Know and Limit Access

3. Detect and Respond

B.

1. Restrict Internet Access and Protect Critical Systems from General IT Environment

2. Reduce Attack Surface and Vulnerabilities

3. Physically Secure the Environment

C.

1. Secure and Protect

2. Prevent and Detect

3. Share and Prepare

D.

1. Raise pragmatically the security bar

2. Maintain appropriate cyber-security hygiene

3. React promptly

Buy Now
Questions 10

Select the correct statement(s).

CSP-Assessor Question 10

Options:

A.

The public and private keys of a Swift certificate are stored on the Hardware Security Module

B.

The certificate stored on the Swift Hardware Security Module is used during the decryption operation of a message

C.

The decryption operation uses the encryption private key of the receiver

D.

To verify the signature the SwiftNetLink uses the signing private key of the receiver

Buy Now
Questions 11

What is expected regarding Token Management when (physical or software-based) tokens are used? (Choose all that apply.)

CSP-Assessor Question 11

Options:

A.

Similar to user accounts, individual assignment and ownership for accurate traceability and revocation in case of potential tampering, loss or in case of user role change

B.

Have in place a strict token assignment process. This avoids the need to perform g a regular review of assigned tokens

C.

Individuals must not share their tokens. Tokens must remain under the control and supervision of its owner

D.

All tokens must be stored in a safe when not used

Buy Now
Questions 12

The Physical Security protection control is also aimed at protecting the “on call” and “working from home” employees’ equipment used to access the Swift-related components.

CSP-Assessor Question 12

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 13

When hesitant on the applicability of a CSCF control to a particular component? What steps should you take? (Choose all that apply.)

CSP-Assessor Question 13

Options:

A.

Call your Swift contact

B.

Check appendix F of the CSCF

C.

Check carefully the Introduction section of the CSCF

D.

Open a case with Swift support via the case manager on swift com if further information or solution cannot be found in the documentation

Buy Now
Questions 14

Is the restriction of Internet access only relevant when having SWIFT-related components in a secure zone?

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

Options:

A.

Yes, because if there is no secure zone, then the internet connectivity does not need to be restricted

B.

No, because there can be in-scope general operator PCs used to access a SWIFT-related application hosted at a service provider

Buy Now
Questions 15

The only type of HSM devices offered by Swift are HSM tokens and HSM boxes.

CSP-Assessor Question 15

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

The Alliance Gateway application is considered a messaging interface.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 17

A detailed CSP assessment report has been provided to the Swift user following the assessment. Is a completion letter also mandated to be supplied?

CSP-Assessor Question 17

Options:

A.

Yes

B.

No

Buy Now
Questions 18

In the illustration, identify the component type of each of the numbered components.

CSP-Assessor Question 18

CSP-Assessor Question 18

Options:

A.

1. Customer Connector

2. Bridging Server (Middleware Server)

3. Customer Connector

4. Bridging Server (Middleware Server)

B.

1. Customer Connector

2. Bridging Server (Middleware Server)

3. Customer Connector

4. Customer Connector

C.

1. Bridging Server (Middleware Server)

2. Bridging Server (Middleware Server)

3. Bridging Server (Middleware Server)

4. Bridging Server (Middleware Server)

D.

1. Customer Connector

2. Customer Connector

3. Customer Connector

4. Customer Connector

Buy Now
Questions 19

From the outsourcing agent diagram, which components in the diagram are in scope and applicable for the Swift user.

CSP-Assessor Question 19

CSP-Assessor Question 19

Options:

A.

Components A, B, C, D and E

B.

Components A and B

C.

Components C, D and E

D.

None of the above

Buy Now
Questions 20

Which statement(s) is/are correct about the LSO/RSO accounts on a Swift Alliance Access? (Choose all that apply.)

CSP-Assessor Question 20

Options:

A.

They are local Security Officers

B.

Their PKI certificates are stored either on a HSM Token or on a HSM-box

C.

They are the business profiles that can sign the Swift financial transactions

D.

They are responsible for the configuration and management of the security functions of the server

Buy Now
Questions 21

A SWIFT user is not based in the same country as the assessor. The assessor would like to perform the assessment remotely. Is this permitted? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Remote assessments are not permitted under any circumstances

B.

This is permitted provided the same level of comfort can be guaranteed

C.

It is possible to perform an assessment remotely only with valid reasons. These reasons must be formally validated by SWIFT CSP office

D.

It is not allowed to conduct an assessment remotely under any circumstances. However, force majeure circumstances like the global pandemic are an exception to this

Buy Now
Questions 22

A Swift user can only exchange FIN messages via the Swift network.

CSP-Assessor Question 22

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 23

A Swift user has moved from one Service Bureau to another What are the obligations of the Swift user in the CSP context?

CSP-Assessor Question 23

Options:

A.

To inform the SB certification office at Swift WW

B.

To reflect that in the next attestation cycle

C.

None if there is no impact in the architecture tope

D.

To submit an updated attestation reflecting this change within 3 months

Buy Now
Questions 24

May an assessor approve a SWIFT User’s KYC-SA attestation? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Yes, if the KYC-SA application is set up in 2-eyes mode, it is possible for the assessor to submit and approve an attestation on behalf of the SWIFT user’s

B.

Yes, with agreement from the CISO of the SWIFT User

C.

No, the approval always remains the responsibility of the CISO of the SWIFT User (or similar level of responsibility)

D.

No, it is the responsibility of the SWIFT user’s internal audit to submit a CSP attestation

Buy Now
Questions 25

Compliance to 2.9 Transaction Business Controls can be obtained through different ways. Which of the following one does not ensure compliance?

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

More than one of the measures proposed in the implementation guidelines are implemented

B.

A customer-designed implementation that encounters the control objective and addresses the risk driver

C.

Reliance on a recent business assessment or regulator response confirming effectiveness of the existing control

D.

Any implementation if approved by the CIO

Buy Now
Questions 26

In an entity having a small infrastructure and only 2 operators, the HR manager explains in a short interview how the security training is implemented providing one example. Would it be acceptable?

CSP-Assessor Question 26

Options:

A.

Yes. it's a risk based testing approach this can be enough in this case

B.

No. more evidence are required

Buy Now
Questions 27

The Physical Security control also includes a regular review of physical access lists of the SWIFT-related servers' locations.

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

The Swift HSM boxes:

CSP-Assessor Question 28

Options:

A.

Are located at the network partner premises and managed by Swift

B.

Are located at the Swift user premises and managed by Swift

C.

Are located at the Swift user premises and managed by the Swift user

D.

Are located at the network partner premises and managed by Swift the network partner

Buy Now
Questions 29

Which of the following statements best describes the difference between an audit and an assessment as per SWIFT CSP definitions? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

An audit is a comprehensive review of a customer’s controls to ensure they meet regulatory requirements, while an assessment is a very high-level review of controls to identify potential weaknesses

B.

An audit looks at the defined controls design and implementation compliance and follows recognized international audit standards, whereas an assessment is less strict but aims the same common objectives

C.

An audit is a one-time event, while an assessment is an ongoing process of monitoring and improving security controls

D.

An audit and an assessment can be used interchangeably

Buy Now
Questions 30

Can an internal audit department submit and approve their SWIFT user’s attestation on the KYC-SA SWIFT portal? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

Yes, providing this is agreed by the head of IT operations and the CISO

B.

No, this is never an option

C.

Yes, an internal auditor can submit the attestation for approval provided they have the appropriate credentials for swift.com. The CISO remains in charge of the approval of the attestation

D.

Yes, with approval from the Chief Auditor

Buy Now
Questions 31

What are the conditions required to allow reliance on the compliance conclusion of a control assessed in the previous year? (Select all answers that apply)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

The control compliance conclusion must have already been relied on the past two years

B.

The previous assessment was performed on the CSCF version of the previous year (at least)

C.

The control definition has not changed

D.

The control design and implementation are the same

Buy Now
Questions 32

Using the outsourcing agent diagram. Which components must be placed in a secure zone? (Choose all that apply.)

CSP-Assessor Question 32

CSP-Assessor Question 32

Options:

A.

Component A

B.

Component B

C.

Component C

D.

Component D

Buy Now
Questions 33

The messaging operator in Alliance Lite2… (Select the two correct answers that apply)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

Can create and modify messages

B.

Can assign RBAC roles to RMA operators and messaging operators

C.

Can approve the Customer Security Officer change requests

D.

Can approve messages

Buy Now
Questions 34

Using the outsourcing agent diagram, which components (including the components in SWIFT user premises) must be placed in a secure zone? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

•Next Service Provider(s)

•SWIFT User

•Outsourcing Agent(s)

•Connector*

•SWIFT

•SWIFT network

Options:

A.

Components A, B, and C

B.

All components

C.

Components A, C, D, and E

D.

Components A, C, and D

Buy Now
Exam Code: CSP-Assessor
Exam Name: Customer Security Programme Assessor Certification(CSPAC)
Last Update: Sep 11, 2025
Questions: 116

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99