Easter Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

CSP-Assessor Exam Results

Customer Security Programme Assessor Certification(CSPAC) Questions and Answers

Question 25

The SWIFT VPN boxes are located between the Messaging and Communication interface.

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

Options:

A.

TRUE

B.

FALSE

Question 26

What are the conditions required to permit reliance on the compliance conclusion of a control assessed in the previous year? (Choose all that apply.)

Options:

A.

The control compliance conclusion must have already been relied on the past two years

B.

The previous assessment was performed on the (correct) CSCF version of the previous year

C.

The control definition has not changed

D.

The control-design and implementation are the same

Question 27

What type of control effectiveness needs to be validated for an independent assessment?

Options:

A.

Effectiveness is never validated only the control design

B.

An independent assessment is a point in time review with possible reviews of older evidence as appropriate

C.

Operational effectiveness needs to be validated

D.

None of the above

Question 28

Which operator session flows are expected to be protected in terms of confidentiality and integrity? (Select the correct answer)

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

Options:

A.

System administrator sessions towards a host running a SWIFT-related component (on-premises or remote)

B.

All sessions to and from a jump server used to access a component in a secure zone

C.

All sessions towards a SWIFT-related application run by an Outsourcing Agent, a Service Bureau, or an L2BA Provider

D.

All of the other answers are valid