Pass the Swift Customer Security Programme (CSP) CSP-Assessor Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

The SWIFT VPN boxes are located between the Messaging and Communication interface.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 32:

The SWIFT user has installed its own Communication Interface on a dedicated virtual machine offered by a public cloud provider. Under which provider category does the public cloud provider fit, and what is the CSP impact? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

Options:

A.

The public cloud provider is considered a L2BA provider, and therefore not in scope of the CSP


B.

The public cloud provider is considered a SWIFT connectivity provider, and therefore not in scope of the CSP


C.

The public cloud provider is considered an outsourcing agent, and therefore in scope of the CSP


D.

This type of implementation is not allowed by the CSP


Expert Solution
Questions # 33:

Which of the following statements best describe valid implementations when implementing control 2.9 Transaction Business Controls? (Choose all that apply.)

Question # 33

Options:

A.

Multiple measures must be implemented by the Swift user to validate the flows of transactions are in the bounds of the normal expected business


B.

A customer designed implementation or a combination of different measures are deemed valid if they sufficiently mitigate the control risks


C.

Reliance on a recent business assessment or regulator response confirming the effectiveness of the control (as an example CPMI's_ requirement) is especially poignant to this control


D.

Any solutions is acceptable so long as the CISO approves the implementation


Expert Solution
Questions # 34:

A Treasury Management System (TMS) application is installed on the same machine as the customer connector, connecting to a Service Bureau. Are these applications/systems in scope of CSCF? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

The TMS application, the customer connector, and the hosting system are in the scope of the CSCF


B.

Only the customer connector application is in scope of the CSCF. The TMS application is a back-office


C.

The TMS application is the highest risk and must be secured appropriately. The customer connector should be secured on a best effort basis


D.

The TMS application, the customer connector, and the hosting system are in scope only if they connect directly to SWIFT, not towards a Service Bureau


Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions