New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Swift CSP-Assessor - Customer Security Programme Assessor Certification(CSPAC)

Page: 3 / 4
Total 116 questions

The internet connectivity restriction control prevents having internet access on any CSCE m-scope components.

A.

TRUE

B.

FALSE

What is the purpose of a SWIFT HSM? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

To encrypt the database of the messaging interface

B.

To store PKI certificates

C.

To connect to the SWIFT Secure IP Network (SIPN)

D.

To format the FIN MT messages

The Alliance Web Platform Administrator uses both the GUI and command line to perform configuration and monitoring tasks on AWP SE.

A.

TRUE

B.

FALSE

The Swift HSM boxes:

A.

Are located at the network partner premises and managed by Swift

B.

Are located at the Swift user premises and managed by Swift

C.

Are located at the Swift user premises and managed by the Swift user

D.

Are located at the network partner premises and managed by Swift the network partner

As a Swift CSP Certified Assessor. Swift contacted me to provide evidence on an assessment I have performed. This is required to support their quality assurance validation process. Is it allowed?

A.

Yes, one of the obligations of the certification programme is that quality assessment can be performed by Swift

B.

No, it's confidential

Select the correct statement about Alliance Gateway.

A.

It is used to exchange messages over the Swift network

B.

It is used to create messages to send over the Swift network

In the illustration, identify which components are in scope of the CSCF? (Choose all that apply.)

A.

Components A, B, K

B.

Components J, K, I

C.

Components F, G, H

D.

Components C, E, M

A Swift user uses an application integrating a sFTP client to push files to a service bureau sFTP server What architecture type is the Swift user? (Choose all that apply.)

A.

A1

B.

B

C.

A3

D.

A4

What must a Swift user implement to comply with a CSCF security control?

A.

A solution that maps the implementation guidelines described for a controls in scope components

B.

A solution that meets the control objectives and addresses the risk drivers for the in scope components)

In an entity having a small infrastructure and only 2 operators, the HR manager explains in a short interview how the security training is implemented providing one example. Would it be acceptable?

A.

Yes. it's a risk based testing approach this can be enough in this case

B.

No. more evidence are required