In the illustration, identify which components are in scope of the CSCF? (Choose all that apply.)

In the illustration, identify which components are in scope of the CSCF? (Choose all that apply.) A . Components A, B, KB . Components J, K, IC . Components F, G, HD . Components C, E, MView AnswerAnswer: D

May 17, 2025 No Comments READ MORE +

What architecture type is the Swift user?

A Swift user relies on a sFTP server to connect through an externally exposed connection with a service provider or a group hub. What architecture type is the Swift user? (Choose all that apply.) A . A1B . A2C . A3D . A4View AnswerAnswer: B, D

May 15, 2025 No Comments READ MORE +

The Swift HSM boxes:

The Swift HSM boxes: A . Are located at the network partner premises and managed by SwiftB . Are located at the Swift user premises and managed by SwiftC . Are located at the Swift user premises and managed by the Swift userD . Are located at the network partner...

May 3, 2025 No Comments READ MORE +

How are online SwiftNet Security Officers authenticated?

How are online SwiftNet Security Officers authenticated? A . Via their PKI certificateB . Via their swift.com account and secure code cardC . Via their swift.com accountView AnswerAnswer: A

March 25, 2025 No Comments READ MORE +

Which encryption methods are used to secure the communications between the SNL host and HSM boxes?

Which encryption methods are used to secure the communications between the SNL host and HSM boxes? A . NTLS and SSHB . Telnet and SSLC . NTLS and TelnetD . MPLS and SSLView AnswerAnswer: A

March 20, 2025 No Comments READ MORE +

The Swift user would like to perform their CSP assessment in May for the CSCF version that will only be active as from July the same year. Is it allowed?

The Swift user would like to perform their CSP assessment in May for the CSCF version that will only be active as from July the same year. Is it allowed? A . No, an assessment can only be done on the active version of the CSCFB . Yes, the assessment...

March 16, 2025 No Comments READ MORE +

Can a Swift user choose to implement the security controls (example: logging and monitoring) in systems which are not directly in scope of the CSCE?

Can a Swift user choose to implement the security controls (example: logging and monitoring) in systems which are not directly in scope of the CSCE? A . YesB . NoView AnswerAnswer: A

March 14, 2025 No Comments READ MORE +

What type of control effectiveness needs to be validated for an independent assessment?

What type of control effectiveness needs to be validated for an independent assessment? A . Effectiveness is never validated only the control designB . An independent assessment is a point in time review with possible reviews of older evidence as appropriateC . Operational effectiveness needs to be validatedD . None...

March 13, 2025 No Comments READ MORE +

The cluster of VPN boxes is also called managed-customer premises equipment (M-CPE).

The cluster of VPN boxes is also called managed-customer premises equipment (M-CPE). A . TRUEB . FALSEView AnswerAnswer: A

March 9, 2025 No Comments READ MORE +

Which of the following statements best describe valid implementations when implementing control 2.9 Transaction Business Controls? (Choose all that apply.)

Which of the following statements best describe valid implementations when implementing control 2.9 Transaction Business Controls? (Choose all that apply.) A . Multiple measures must be implemented by the Swift user to validate the flows of transactions are in the bounds of the normal expected businessB . A customer designed...

February 26, 2025 No Comments READ MORE +