Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

CSP-Assessor PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CSP-Assessor PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Customer Security Programme Assessor Certification(CSPAC)
  • Last Update: Sep 12, 2025
  • Questions and Answers: 116
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CSP-Assessor Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CSP-Assessor Practice Exam Questions with Answers Customer Security Programme Assessor Certification(CSPAC) Certification

Question # 6

The only type of HSM devices offered by Swift are HSM tokens and HSM boxes.

CSP-Assessor question answer

A.

TRUE

B.

FALSE

Full Access
Question # 7

Application Hardening basically applies the following principles. (Choose all that apply.)

CSP-Assessor question answer

A.

Least Privileges

B.

Access on a need to have

C.

Reduced footprint for less potential vulnerabilities

D.

Enhanced Straight Through Processing

Full Access
Question # 8

Select the components a SwiftNet Link (SNL) may communicate with. (Choose all that apply.)

CSP-Assessor question answer

A.

The Graphical User Interface

B.

The VPN boxes

C.

The HSM device

D.

The messaging interface (such as Alliance Access)

Full Access
Question # 9

What are the conditions required to allow reliance on the compliance conclusion of a control assessed in the previous year? (Select all answers that apply)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

The control compliance conclusion must have already been relied on the past two years

B.

The previous assessment was performed on the CSCF version of the previous year (at least)

C.

The control definition has not changed

D.

The control design and implementation are the same

Full Access
Question # 10

Select the supporting documents to conduct a CSP assessment. (Choose all that apply.)

CSP-Assessor question answer

A.

The CSP User Handbook

B.

The mapping to industry standards article

C.

The Controls Matrix and High Level Test P an

D.

The Customer Security Controls Framework

Full Access
Question # 11

What are the three main objectives of the Customer Security Controls Framework? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

A.

1. Secure your environment

2. Know and Limit Access

3. Detect and Respond

B.

1. Restrict Internet Access and Protect Critical Systems from General IT Environment

2. Reduce Attack Surface and Vulnerabilities

3. Physically Secure the Environment

C.

1. Secure and Protect

2. Prevent and Detect

3. Share and Prepare

D.

1. Raise pragmatically the security bar

2. Maintain appropriate cyber-security hygiene

3. React promptly

Full Access
Question # 12

The Physical Security control also includes a regular review of physical access lists of the SWIFT-related servers' locations.

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

A.

TRUE

B.

FALSE

Full Access
Question # 13

What type of keys does the HSM box store? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

Private keys

B.

Public keys

C.

Both private and public keys

Full Access
Question # 14

A Swift user relies on a sFTP server to connect through an externally exposed connection with a service provider or a group hub What architecture type is the Swift user? (Choose all that apply.)

CSP-Assessor question answer

A.

A1

B.

A2

C.

A3

D.

A4

Full Access
Question # 15

When hesitant on the applicability of a CSCF control to a particular component? What steps should you take? (Choose all that apply.)

CSP-Assessor question answer

A.

Call your Swift contact

B.

Check appendix F of the CSCF

C.

Check carefully the Introduction section of the CSCF

D.

Open a case with Swift support via the case manager on swift com if further information or solution cannot be found in the documentation

Full Access
Question # 16

Can an internal audit department submit and approve their Swift user's attestation on the KYC-SA Swift portal?

CSP-Assessor question answer

A.

Yes, providing this is agreed by the head of IT operations and the CISO

B.

No, this is never an option

C.

Yes, an internal auditor can submit the attestation for approval provided they have the appropriate credentials for switt.com. The CISO remains in charge of the approval of the attestation

D.

Yes, with approval from the Chief auditor

Full Access
Question # 17

What does SWIFT provide? (Select the two correct answers that apply)

CSP-Assessor question answer

A.

A platform for messaging

B.

Standards for communicating

C.

Hosting for financial institutions

D.

A high-level programming language

Full Access
Question # 18

The cluster of VPN boxes is also called managed-customer premises equipment (M-CPE).

CSP-Assessor question answer

A.

TRUE

B.

FALSE

Full Access
Question # 19

Using the outsourcing agent diagram. Which components must be placed in a secure zone? (Choose all that apply.)

CSP-Assessor question answer

CSP-Assessor question answer

A.

Component A

B.

Component B

C.

Component C

D.

Component D

Full Access
Question # 20

Which operator session flows are expected to be protected in terms of confidentiality and integrity? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

System administrator sessions towards a host running a SWIFT-related component (on-premises or remote)

B.

All sessions to and from a jump server used to access a component in a secure zone

C.

All sessions towards a SWIFT-related application run by an Outsourcing Agent, a Service Bureau, or an L2BA Provider

D.

All of the other answers are valid

Full Access
Question # 21

Alliance Lite2 only supports the sending and receiving of FIN messages.

CSP-Assessor question answer

A.

TRUE

B.

FALSE

Full Access
Question # 22

For each of the following setups, the responsible party is identified to protect the virtualization or cloud underlying platform. Which one of the combinations is not correct?

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

For on-premises virtualization platform: by the platform provider

B.

For virtualization platform deployed at a third party on which user’s SWIFT-related components are virtually hosted: by the third party

C.

For on-premises container platform: by the SWIFT user

D.

For Cloud Provider: the cloud provider

Full Access
Question # 23

How many Swift Security Officers does an organization need at minimum?

CSP-Assessor question answer

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 24

Select the correct statement about Alliance Gateway.

CSP-Assessor question answer

A.

It is used to exchange messages over the Swift network

B.

It is used to create messages to send over the Swift network

Full Access
Question # 25

Which of the following infrastructures has the smallest SWIFT footprint? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

Full stack of products up to the Messaging Interface

B.

Alliance Remote Gateway

C.

Lite 2 or Alliance Cloud

D.

A user with a Messaging Interface behind a Service Bureau

Full Access
Question # 26

The Alliance Gateway application is considered a messaging interface.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

TRUE

B.

FALSE

Full Access
Question # 27

What type of control effectiveness needs to be validated for an independent assessment?

CSP-Assessor question answer

A.

Effectiveness is never validated only the control design

B.

An independent assessment is a point in time review with possible reviews of older evidence as appropriate

C.

Operational effectiveness needs to be validated

D.

None of the above

Full Access
Question # 28

The SWIFT user has a local communication interface as their main channel to SWIFT. For contingency, the SWIFT user also has a connector as a backup channel. What is the architecture type for this SWIFT user? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift CSP Assessment Report Template

A.

A1

B.

A2

C.

A3

D.

A4

Full Access
Question # 29

As a Swift CSP Certified Assessor. Swift contacted me to provide evidence on an assessment I have performed. This is required to support their quality assurance validation process. Is it allowed?

CSP-Assessor question answer

A.

Yes, one of the obligations of the certification programme is that quality assessment can be performed by Swift

B.

No, it's confidential

Full Access
Question # 30

Which of the following statements best describe valid implementations when implementing control 2.9 Transaction Business Controls? (Choose all that apply.)

CSP-Assessor question answer

A.

Multiple measures must be implemented by the Swift user to validate the flows of transactions are in the bounds of the normal expected business

B.

A customer designed implementation or a combination of different measures are deemed valid if they sufficiently mitigate the control risks

C.

Reliance on a recent business assessment or regulator response confirming the effectiveness of the control (as an example CPMI's_ requirement) is especially poignant to this control

D.

Any solutions is acceptable so long as the CISO approves the implementation

Full Access
Question # 31

What is expected regarding Token Management when (physical or software-based) tokens are used? (Choose all that apply.)

CSP-Assessor question answer

A.

Similar to user accounts, individual assignment and ownership for accurate traceability and revocation in case of potential tampering, loss or in case of user role change

B.

Have in place a strict token assignment process. This avoids the need to perform g a regular review of assigned tokens

C.

Individuals must not share their tokens. Tokens must remain under the control and supervision of its owner

D.

All tokens must be stored in a safe when not used

Full Access
Question # 32

How can PKI certificate requests be submitted to SWIFT? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

Using both online and offline methods

B.

Using an online method

C.

Using an offline method

D.

None of the above

Full Access
Question # 33

A Swift user has remediated an exception reported by the assessor. What are their obligations before updating and submitting an attestation reflecting the new compliance level?

CSP-Assessor question answer

A.

The exception must be re-assessed by an independent assessor. The assessor can be different to the one who initially raised the exception

B.

The exception must be re-assessed by the same independent assessor that raised the exception

C.

The first line of defense can confirm their level of compliance using a self-assessment approach

D.

None, if the remediation has been completed, a new attestation can be submitted reflecting the compliance of the control

Full Access
Question # 34

In the context of CSP, what type of component is the Alliance Access? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

A Messaging Interface

B.

A Communication Interface

C.

A SWIFT Connector

D.

A Secure Server

Full Access