<< Prev Question Next Question >>

Question 22/28

The objective of the Customer Environment Protection control is to separate the user's Swift infrastructure which restricts malicious access from the external world and from the General IT environment of the Swift user.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (28q)
Question 1: Using the outsourcing agent diagram. Which components must b...
Question 2: Select the supporting documents to conduct a CSP assessment....
Question 3: How are online SwiftNet Security Officers authenticated? (Ex...
Question 4: A Swift user can only exchange FIN messages via the Swift ne...
Question 5: What type of control effectiveness needs to be validated for...
Question 6: Is the control 2. 11 "RMA Business Controls" only about the ...
Question 7: Is it necessary to formally explain to the Swift user the te...
Question 8: A detailed CSP assessment report has been provided to the Sw...
Question 9: The cluster of VPN boxes is also called managed-customer pre...
Question 10: Which encryption methods are used to secure the communicatio...
Question 11: How many Swift Security Officers does an organization need a...
Question 12: A Swift user has remediated an exception reported by the ass...
Question 13: In an entity having a small infrastructure and only 2 operat...
Question 14: A Swift user uses an application integrating a sFTP client t...
Question 15: A Swift user relies on a sFTP server to connect through an e...
Question 16: Can an assessor re-use an ISAE 3000 report dating back 2 yea...
Question 17: When hesitant on the applicability of a CSCF control to a pa...
Question 18: A Swift user has moved from one Service Bureau to another Wh...
Question 19: The Physical Security protection control is also aimed at pr...
Question 20: As a Swift CSP Certified Assessor, I left the listed provide...
Question 21: The Alliance Web Platform Administrator uses both the GUI an...
Question 22: The objective of the Customer Environment Protection control...
Question 23: Which of the following statements best describe valid implem...
Question 24: A Treasury Management System (TMS) application is installed ...
Question 25: Which ones are Alliance Lite2 key components? (Choose all th...
Question 26: Can an internal audit department submit and approve their Sw...
Question 27: The only type of HSM devices offered by Swift are HSM tokens...
Question 28: Application Hardening basically applies the following princi...