The cluster of VPN boxes is also called managed-customer premises equipment (M-CPE).

The cluster of VPN boxes is also called managed-customer premises equipment (M-CPE). A . TRUEB . FALSEView AnswerAnswer: A

March 9, 2025 No Comments READ MORE +

Which of the following statements best describe valid implementations when implementing control 2.9 Transaction Business Controls? (Choose all that apply.)

Which of the following statements best describe valid implementations when implementing control 2.9 Transaction Business Controls? (Choose all that apply.) A . Multiple measures must be implemented by the Swift user to validate the flows of transactions are in the bounds of the normal expected businessB . A customer designed...

February 26, 2025 No Comments READ MORE +

A detailed CSP assessment report has been provided to the Swift user following the assessment. Is a completion letter also mandated to be supplied?

A detailed CSP assessment report has been provided to the Swift user following the assessment. Is a completion letter also mandated to be supplied? A . YesB . NoView AnswerAnswer: A

February 24, 2025 No Comments READ MORE +

Is the control 2. 11 "RMA Business Controls” only about the process of validating the defined counterparty relationships?

Is the control 2. 11 "RMA Business Controls” only about the process of validating the defined counterparty relationships? A . YesB . NoView AnswerAnswer: B

February 22, 2025 No Comments READ MORE +

Which components must be placed in a secure zone?

Using the outsourcing agent diagram. Which components must be placed in a secure zone? (Choose all that apply.) A . Component AB . Component BC . Component CD . Component DView AnswerAnswer: A, D

February 22, 2025 No Comments READ MORE +

Select the correct statement about Alliance Gateway.

Select the correct statement about Alliance Gateway. A . It is used to exchange messages over the Swift networkB . It is used to create messages to send over the Swift networkView AnswerAnswer: A

February 15, 2025 No Comments READ MORE +

What steps should you take?

When hesitant on the applicability of a CSCF control to a particular component? What steps should you take? (Choose all that apply.) A . Call your Swift contactB . Check appendix F of the CSCFC . Check carefully the Introduction section of the CSCFD . Open a case with Swift...

February 13, 2025 No Comments READ MORE +

Select the correct statement(s).

Select the correct statement(s). A . The public and private keys of a Swift certificate are stored on the Hardware Security ModuleB . The certificate stored on the Swift Hardware Security Module is used during the decryption operation of a messageC . The decryption operation uses the encryption private key...

February 12, 2025 No Comments READ MORE +

The internet connectivity restriction control prevents having internet access on any CSCE m-scope components.

The internet connectivity restriction control prevents having internet access on any CSCE m-scope components. A . TRUEB . FALSEView AnswerAnswer: B

February 11, 2025 No Comments READ MORE +

Application Hardening basically applies the following principles. (Choose all that apply.)

Application Hardening basically applies the following principles. (Choose all that apply.) A . Least PrivilegesB . Access on a need to haveC . Reduced footprint for less potential vulnerabilitiesD . Enhanced Straight Through ProcessingView AnswerAnswer: A, B, C

February 8, 2025 No Comments READ MORE +