Black Friday Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 4
Total 34 questions
Exam Code: CSP-Assessor                Update: Nov 22, 2025
Exam Name: Customer Security Programme Assessor Certification(CSPAC)

Swift Customer Security Programme Assessor Certification(CSPAC) CSP-Assessor Exam Dumps: Updated Questions & Answers (November 2025)

Question # 1

Which ones are Alliance Lite2 key components? (Choose all that apply.)

A.

A web interface

B.

An AutoClient

C.

A HSM box

D.

A WebSphere MQ Server

Question # 2

How many Swift Security Officers does an organization need at minimum?

A.

1

B.

2

C.

3

D.

4

Question # 3

May an assessor approve a SWIFT User’s KYC-SA attestation? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

Yes, if the KYC-SA application is set up in 2-eyes mode, it is possible for the assessor to submit and approve an attestation on behalf of the SWIFT user’s

B.

Yes, with agreement from the CISO of the SWIFT User

C.

No, the approval always remains the responsibility of the CISO of the SWIFT User (or similar level of responsibility)

D.

No, it is the responsibility of the SWIFT user’s internal audit to submit a CSP attestation

Question # 4

The SWIFT user’s first line of defence has performed a detailed self-assessment demonstrating an adequate compliance level to each of the applicable controls. As an assessor, may I fully rely on this analysis if the SWIFT user can demonstrate that their conclusion was based on a valid testing approach? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

Yes

B.

Yes, but only if the CISO signs the completion letter at the end of the assessment

C.

No, even if it could support the compliance level, additional testing will always be required by the independent assessor to confirm a controls compliance level

D.

No, except if the SWIFT user’s chief auditor approves this approach

Question # 5

Penetration testing must be performed at application level against the Swift-related components, such as the interfaces, Swift and customer connectors?

A.

True, those are key components

B.

False, only the components as defined in Swift Testing Policy

Question # 6

Which operator session flows are expected to be protected in terms of confidentiality and integrity? (Choose all that apply.)

A.

System administrator sessions towards a host running a Swift related component

B.

All sessions to and from a jump server used to access a component in a secure zone

C.

All sessions towards a secure zone (on-premises or hosted by a third-party or a Cloud Provider)

D.

All sessions towards a Swift related application run by an Outsourcing Agent, a Service Bureau or an L2BA Provider

Question # 7

The SwiftNet Link (SNL) software is always required for the Swift Alliance Gateway to operate.

SIL Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

TRUE

B.

FALSE

Question # 8

Is the restriction of Internet access only relevant when having Swift-related components in a secure zone?

A.

Yes, because if there is no secure zone then the internet connectivity does not need to be restricted

B.

No, because there can be in-scope general operator PCs used to access a Swift-related application hosted at a service provider

Question # 9

Application Hardening basically applies the following principles. (Choose all that apply.)

A.

Least Privileges

B.

Access on a need to have

C.

Reduced footprint for less potential vulnerabilities

D.

Enhanced Straight Through Processing

Question # 10

A Swift user has remediated an exception reported by the assessor. What are their obligations before updating and submitting an attestation reflecting the new compliance level?

A.

The exception must be re-assessed by an independent assessor. The assessor can be different to the one who initially raised the exception

B.

The exception must be re-assessed by the same independent assessor that raised the exception

C.

The first line of defense can confirm their level of compliance using a self-assessment approach

D.

None, if the remediation has been completed, a new attestation can be submitted reflecting the compliance of the control

Page: 1 / 4
Total 34 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 22 Nov 2025