Which encryption methods are used to secure the communications between the SNL host and HSM boxes?
Which encryption methods are used to secure the communications between the SNL host and HSM boxes? A . NTLS and SSHB . Telnet and SSLC . NTLS and TelnetD . MPLS and SSLView AnswerAnswer: A
The Swift user would like to perform their CSP assessment in May for the CSCF version that will only be active as from July the same year. Is it allowed?
The Swift user would like to perform their CSP assessment in May for the CSCF version that will only be active as from July the same year. Is it allowed? A . No, an assessment can only be done on the active version of the CSCFB . Yes, the assessment...
Can a Swift user choose to implement the security controls (example: logging and monitoring) in systems which are not directly in scope of the CSCE?
Can a Swift user choose to implement the security controls (example: logging and monitoring) in systems which are not directly in scope of the CSCE? A . YesB . NoView AnswerAnswer: A
What type of control effectiveness needs to be validated for an independent assessment?
What type of control effectiveness needs to be validated for an independent assessment? A . Effectiveness is never validated only the control designB . An independent assessment is a point in time review with possible reviews of older evidence as appropriateC . Operational effectiveness needs to be validatedD . None...
The cluster of VPN boxes is also called managed-customer premises equipment (M-CPE).
The cluster of VPN boxes is also called managed-customer premises equipment (M-CPE). A . TRUEB . FALSEView AnswerAnswer: A
Which of the following statements best describe valid implementations when implementing control 2.9 Transaction Business Controls? (Choose all that apply.)
Which of the following statements best describe valid implementations when implementing control 2.9 Transaction Business Controls? (Choose all that apply.) A . Multiple measures must be implemented by the Swift user to validate the flows of transactions are in the bounds of the normal expected businessB . A customer designed...
A detailed CSP assessment report has been provided to the Swift user following the assessment. Is a completion letter also mandated to be supplied?
A detailed CSP assessment report has been provided to the Swift user following the assessment. Is a completion letter also mandated to be supplied? A . YesB . NoView AnswerAnswer: A
Is the control 2. 11 "RMA Business Controls” only about the process of validating the defined counterparty relationships?
Is the control 2. 11 "RMA Business Controls” only about the process of validating the defined counterparty relationships? A . YesB . NoView AnswerAnswer: B
Which components must be placed in a secure zone?
Using the outsourcing agent diagram. Which components must be placed in a secure zone? (Choose all that apply.) A . Component AB . Component BC . Component CD . Component DView AnswerAnswer: A, D
Select the correct statement about Alliance Gateway.
Select the correct statement about Alliance Gateway. A . It is used to exchange messages over the Swift networkB . It is used to create messages to send over the Swift networkView AnswerAnswer: A