Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

The SWIFT PKI certificates are used for… (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

Asymmetric signing and encryption end to end

B.

Asymmetric signing and encryption end to SWIFT only

C.

Symmetric encryption only

D.

Asymmetric signing only

Full Access
Question # 5

The outsourcing agent of the SWIFT user provided them with an independent assessment report covering the CSP components in their scope, and using the latest CSCF version for testing. Is it enough to support the CSP attestation for the outsourced components? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

Yes, after confirmation and validation of the scope

B.

Yes, only if the outsourcing agent is a global trusted provider and published the report on their compliance portal

C.

No, an audit report (and not an assessment) is required from the outsourcing agent as an external provider

D.

No, except if the cloud provider components are partially covered by the SWIFT Alliance Connect Virtual programme

Full Access
Question # 6

The Alliance Gateway application is considered a messaging interface.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

TRUE

B.

FALSE

Full Access
Question # 7

The SWIFT user has a local communication interface as their main channel to SWIFT. For contingency, the SWIFT user also has a connector as a backup channel. What is the architecture type for this SWIFT user? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift CSP Assessment Report Template

A.

A1

B.

A2

C.

A3

D.

A4

Full Access
Question # 8

How many Swift Security Officers does an organization need at minimum?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 9

A Swift user has moved from one Service Bureau to another What are the obligations of the Swift user in the CSP context?

A.

To inform the SB certification office at Swift WW

B.

To reflect that in the next attestation cycle

C.

None if there is no impact in the architecture tope

D.

To submit an updated attestation reflecting this change within 3 months

Full Access
Question # 10

A Treasury Management System (TMS) application is installed on the same machine as the customer connector, connecting to a Service Bureau. Are these applications/systems in scope of CSCF? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

The TMS application, the customer connector, and the hosting system are in the scope of the CSCF

B.

Only the customer connector application is in scope of the CSCF. The TMS application is a back-office

C.

The TMS application is the highest risk and must be secured appropriately. The customer connector should be secured on a best effort basis

D.

The TMS application, the customer connector, and the hosting system are in scope only if they connect directly to SWIFT, not towards a Service Bureau

Full Access
Question # 11

A detailed CSP assessment report has been provided to the Swift user following the assessment. Is a completion letter also mandated to be supplied?

A.

Yes

B.

No

Full Access
Question # 12

Which statements are true of Alliance Messaging Hub (AMH)? (Select the correct answer)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

AMH is highly resilient, and can consist of multiple instances and sites in parallel

B.

AMH provides advanced integration capabilities

C.

AMH is a messaging interface able to connect to other financial networks, not only SWIFT

D.

All of the above

Full Access
Question # 13

Which user roles are available in Alliance Cloud by default. (Choose all that apply.)

A.

Role and Operator management

B.

Message Management

C.

Administrator

D.

Message Security Administrator

Full Access
Question # 14

Select the supporting documents to conduct a CSP assessment. (Choose all that apply.)

A.

The CSP User Handbook

B.

The mapping to industry standards article

C.

The Controls Matrix and High Level Test P an

D.

The Customer Security Controls Framework

Full Access
Question # 15

Which authentication methods are possible on the Alliance Interfaces? (Choose all that apply.)

A.

Password

B.

LDAP Authentication

C.

Radius One-time password

D.

Password and TOTP

Full Access
Question # 16

Which operator session flows are expected to be protected in terms of confidentiality and integrity? (Choose all that apply.)

A.

System administrator sessions towards a host running a Swift related component

B.

All sessions to and from a jump server used to access a component in a secure zone

C.

All sessions towards a secure zone (on-premises or hosted by a third-party or a Cloud Provider)

D.

All sessions towards a Swift related application run by an Outsourcing Agent, a Service Bureau or an L2BA Provider

Full Access
Question # 17

From the outsourcing agent diagram, which components in the diagram are in scope and applicable for the Swift user.

A.

Components A, B, C, D and E

B.

Components A and B

C.

Components C, D and E

D.

None of the above

Full Access
Question # 18

What is expected regarding Token Management when (physical or software-based) tokens are used? (Choose all that apply.)

A.

Similar to user accounts, individual assignment and ownership for accurate traceability and revocation in case of potential tampering, loss or in case of user role change

B.

Have in place a strict token assignment process. This avoids the need to perform g a regular review of assigned tokens

C.

Individuals must not share their tokens. Tokens must remain under the control and supervision of its owner

D.

All tokens must be stored in a safe when not used

Full Access
Question # 19

Can an internal audit department submit and approve their Swift user's attestation on the KYC-SA Swift portal?

A.

Yes, providing this is agreed by the head of IT operations and the CISO

B.

No, this is never an option

C.

Yes, an internal auditor can submit the attestation for approval provided they have the appropriate credentials for switt.com. The CISO remains in charge of the approval of the attestation

D.

Yes, with approval from the Chief auditor

Full Access
Question # 20

The Physical Security protection control is also aimed at protecting the “on call” and “working from home” employees’ equipment used to access the Swift-related components.

A.

TRUE

B.

FALSE

Full Access
Question # 21

To verify the applicability of a CSCF control to a specific component, several actions may be considered. Which one does not apply in this case?

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

Check in the CSP Policy document

B.

Check appendix F of the CSCF

C.

Check carefully the Introduction section of the CSCF

D.

Open a case with SWIFT support via the case manager on swift.com if further information or solution cannot be found in the documentation

Full Access
Question # 22

An application only uses (i) the SWIFT API for reporting and gpi basic tracker calls through (ii) a tailored account not allowing business transactions management. Is this application in scope of the CSCF? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

Yes, it is in scope and considered a customer connector because it reads business transaction data

B.

No, it can be descoped because there is no business transaction management being performed

C.

No, it is not in scope because the API connection method is not in scope of the CSP

D.

Yes, it is in scope because the API connection method is less secure than SWIFT interfaces

Full Access
Question # 23

Which statements are correct about the Alliance Access LSO and RSO? (Select the two correct answers that apply)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

They are Alliance Security Officers

B.

Their PKI certificates are stored either on an HSM Token or on an HSM-box

C.

They are the business profiles that can sign the SWIFT financial transactions

D.

They are responsible for the configuration and management of the security functions in the messaging interface

Full Access
Question # 24

Is it necessary to formally explain to the Swift user the testing methodology that will be used for the CSP assessment during the kick-off?

A.

Yes

B.

No

Full Access
Question # 25

Compliance to 2.9 Transaction Business Controls can be obtained through different ways. Which of the following one does not ensure compliance?

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

More than one of the measures proposed in the implementation guidelines are implemented

B.

A customer-designed implementation that encounters the control objective and addresses the risk driver

C.

Reliance on a recent business assessment or regulator response confirming effectiveness of the existing control

D.

Any implementation if approved by the CIO

Full Access
Question # 26

Can a Swift user choose to implement the security controls (example: logging and monitoring) in systems which are not directly in scope of the CSCE?

A.

Yes

B.

No

Full Access
Question # 27

Which ones are Alliance Lite2 key components? (Choose all that apply.)

A.

A web interface

B.

An AutoClient

C.

A HSM box

D.

A WebSphere MQ Server

Full Access
Question # 28

What are the possible impacts for a SWIFT user to be non-compliant to CSP? (Select the two correct answers that apply)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

To be reported to their supervisors (if applicable)

B.

To be seen as non-compliant to their counterparts in KYC-SA

C.

To be contacted by SWIFT to provide the CSP assessment report and detailed information about the reason of non-compliance

D.

To be delisted from the BIC directory

Full Access
Question # 29

Where is the implementation of multi-factor authentication deemed sufficient to support control 4.2 compliance? (Choose all that apply.)

A.

When accessing an outsourcing agent or an L2BA Swift-related application

B.

When logging-in on an interface, a connector, or the system running such component

C.

When login on the jump server filtering access to local Swift secure zone

D.

On the General Operator PC used to access a Swift-related component

Full Access
Question # 30

Select the correct statement(s).

A.

The public and private keys of a Swift certificate are stored on the Hardware Security Module

B.

The certificate stored on the Swift Hardware Security Module is used during the decryption operation of a message

C.

The decryption operation uses the encryption private key of the receiver

D.

To verify the signature the SwiftNetLink uses the signing private key of the receiver

Full Access
Question # 31

What are the conditions required to permit reliance on the compliance conclusion of a control assessed in the previous year? (Choose all that apply.)

A.

The control compliance conclusion must have already been relied on the past two years

B.

The previous assessment was performed on the (correct) CSCF version of the previous year

C.

The control definition has not changed

D.

The control-design and implementation are the same

Full Access
Question # 32

What are the three main objectives of the Customer Security Controls Framework? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

A.

1. Secure your environment

2. Know and Limit Access

3. Detect and Respond

B.

1. Restrict Internet Access and Protect Critical Systems from General IT Environment

2. Reduce Attack Surface and Vulnerabilities

3. Physically Secure the Environment

C.

1. Secure and Protect

2. Prevent and Detect

3. Share and Prepare

D.

1. Raise pragmatically the security bar

2. Maintain appropriate cyber-security hygiene

3. React promptly

Full Access
Question # 33

Who can connect to SWIFT? (Select all answers that apply)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

Financial institutions, such as banks and securities broker-dealers

B.

Individuals who use online banking for international transfers

C.

Market infrastructures that provide financial institutions with centralized transaction processing

D.

Corporates that work with multiple banking partners

Full Access
Question # 34

Select the correct statement about SWIFT Alliance Cloud.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

Alliance Cloud is a SWIFT cloud-based solution. It provides a universal channel to the financial community and to SWIFT Value Added services and initiatives

B.

Alliance Cloud is a cloud-based solution. It is offered by the 3 official public cloud providers. This allows customers the choice to select their preferred cloud provider

C.

Alliance Cloud is a cloud-based solution. It is offered by any public cloud provider that subscribed to the digital connectivity initiative

D.

Alliance Cloud is a SWIFT cloud-based solution. It consists of an Alliance Access instance deployed at one of the three SWIFT-approved public cloud providers

Full Access