Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Using the outsourcing agent diagram. Which components must be placed in a secure zone? (Choose all that apply.)

A.

Component A

B.

Component B

C.

Component C

D.

Component D

The cluster of VPN boxes is also called managed-customer premises equipment (M-CPE).

A.

TRUE

B.

FALSE

In an entity having a small infrastructure and only 2 operators, the HR manager explains in a short interview how the security training is implemented providing one example. Would it be acceptable?

A.

Yes. it's a risk based testing approach this can be enough in this case

B.

No. more evidence are required

What are the conditions required to permit reliance on the compliance conclusion of a control assessed in the previous year? (Choose all that apply.)

A.

The control compliance conclusion must have already been relied on the past two years

B.

The previous assessment was performed on the (correct) CSCF version of the previous year

C.

The control definition has not changed

D.

The control-design and implementation are the same

Select the correct statement about Alliance Gateway.

A.

It is used to exchange messages over the Swift network

B.

It is used to create messages to send over the Swift network

Which of the following statements best describe valid implementations when implementing control 2.9 Transaction Business Controls? (Choose all that apply.)

A.

Multiple measures must be implemented by the Swift user to validate the flows of transactions are in the bounds of the normal expected business

B.

A customer designed implementation or a combination of different measures are deemed valid if they sufficiently mitigate the control risks

C.

Reliance on a recent business assessment or regulator response confirming the effectiveness of the control (as an example CPMI's_ requirement) is especially poignant to this control

D.

Any solutions is acceptable so long as the CISO approves the implementation

Select the correct statement(s).

A.

The public and private keys of a Swift certificate are stored on the Hardware Security Module

B.

The certificate stored on the Swift Hardware Security Module is used during the decryption operation of a message

C.

The decryption operation uses the encryption private key of the receiver

D.

To verify the signature the SwiftNetLink uses the signing private key of the receiver

The messaging operator in Alliance Lite2… (Select the two correct answers that apply)

•Connectivity

•Generic

•Products Cloud

•Products OnPrem

•Security

A.

Can create and modify messages

B.

Can assign RBAC roles to RMA operators and messaging operators

C.

Can approve the Customer Security Officer change requests

D.

Can approve messages

To verify the applicability of a CSCF control to a specific component, several actions may be considered. Which one does not apply in this case?

•Swift Customer Security Controls Policy

•Swift Customer Security Controls Framework v2025

•Independent Assessment Framework

•Independent Assessment Process for Assessors Guidelines

•Independent Assessment Framework - High-Level Test Plan Guidelines

•Outsourcing Agents - Security Requirements Baseline v2025

•CSP Architecture Type - Decision tree

•CSP_controls_matrix_and_high_test_plan_2025

•Assessment template for Mandatory controls

•Assessment template for Advisory controls

•CSCF Assessment Completion Letter

•Swift_CSP_Assessment_Report_Template

A.

Check in the CSP Policy document

B.

Check appendix F of the CSCF

C.

Check carefully the Introduction section of the CSCF

D.

Open a case with SWIFT support via the case manager on swift.com if further information or solution cannot be found in the documentation

The Swift HSM boxes:

A.

Are located at the network partner premises and managed by Swift

B.

Are located at the Swift user premises and managed by Swift

C.

Are located at the Swift user premises and managed by the Swift user

D.

Are located at the network partner premises and managed by Swift the network partner