Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CMMC-CCA Questions and Answers

Question # 6

A company is undergoing a CMMC Level 2 Assessment. During the Conduct Assessment phase, an Assessment Team member is reviewing the policies and procedures in the incident response plan.

Which assessment method is being utilized?

A.

Test

B.

Examine

C.

Interview

D.

Observation

Full Access
Question # 7

An OSC is preparing for assessment. Which item of evidence would show the OSC’s efforts to restrict physical access within the OSC’s environment?

A.

VPN configuration

B.

Switch configuration files

C.

Network architecture drawings

D.

Documented OSC procedures

Full Access
Question # 8

While scoping the assessment, the assessor learns that the OSC uses various cloud-based solutions sporadically as part of its normal course of business. The OSC states that most business is conducted on-premises and that only a small amount of business uses the cloud. The OSC thinks the cloud is only used for system backups, but there are isolated exceptions.

Are the data provided sufficient to determine that the OSC limits connection to external information systems?

A.

No, the OSC stated most of its business is on-premises.

B.

No, the OSC did not fully define the extent external connections are used.

C.

Yes, the OSC confirmed that external connections occur.

D.

Yes, the OSC confirmed that external connections occur for system backups.

Full Access
Question # 9

An OSC has a hardware and software list used to manage company assets. Which is the BEST evidence to show the OSC is managing the system baseline?

A.

Media protection

B.

Physical protection

C.

Configuration management

D.

Identification and authentication policy

Full Access
Question # 10

What is NOT required for the Lead Assessor to confirm when verifying readiness to conduct an assessment?

A.

That risks have been identified

B.

That necessary logistics have been arranged

C.

Whether the OSC can better meet the targeted CMMC Level

D.

That evidence is available and accessible for the targeted CMMC Level

Full Access
Question # 11

While reviewing CA.L2-3.12.3: Security Control Monitoring, the CCA notices that the assessment period is defined as one year. An OSC's SSP states that under CA.L2-3.12.3, security controls are monitored using the same one-year periodicity to ensure the continued effectiveness of the controls. The assessor understands that some CMMC practices can reference other practices for the entirety of their implementation. Is the OSC’s implementation under CA.L2-3.12.3: Security Control Monitoring acceptable?

A.

No, even when referencing other practices more description is always needed.

B.

No, monitoring must be conducted on an ongoing basis to ensure continued effectiveness.

C.

Yes, a one-year period for security control monitoring is acceptable.

D.

Yes, as long as CA.L2-3.12.1 has been scored as MET, they do need to be monitored.

Full Access
Question # 12

Different mechanisms can be used to protect information at rest. Which mechanism is MOST LIKELY to afford protection for information at rest?

A.

Patching

B.

File share

C.

Secure offline storage

D.

Cryptographic mechanisms

Full Access
Question # 13

ESPs are exceptionally common today, given that many organizations are turning to secure cloud offerings to establish and maintain compliance. Integral to these relationships is a responsibility matrix, which defines who is responsible for specific items such as security. This can be a very complex assortment of taskings associated with federal compliance, but what is the MOST important thing to remember?

A.

The ESP is technically not part of the DIB and has no responsibility to be CMMC compliant in its own right.

B.

The CMMC Assessment Team will factor in any documentation provided by the ESP when evaluating the OSC for compliance.

C.

The relationship of an OSC with an ESP is a partnership and the CMMC Assessment will evaluate the ESP at the same time as the OSC.

D.

Only the OSC is being assessed for compliance, and while the ESP may have a lot of responsibilities in the matrix, the OSC is ultimately responsible for meeting the requirements as specified by government mandates.

Full Access
Question # 14

A C3PAO is conducting a Level 2 assessment of a midsized construction contractor that does both private (commercial) and federal work. The contractor’s documentation states that all CUI flows through a single building on their office campus and is logically, physically, and administratively isolated from the rest of the environment. Why might an assessor request access to assess controls within a building or area not listed as in-scope in the documentation?

A.

If the assessor sees personnel carrying locked cases into the other building or area

B.

If the OSC has an underground passageway connecting the CUI building to a non-CUI building

C.

If network diagrams indicate the commercial and federal sectors share a single Internet connection

D.

If Human Resources that supports both commercial and federal sectors sits in the other building or area

Full Access
Question # 15

The Lead Assessor is compiling the assessment results, which must contain the status for each of the applicable practices. Some practices have been placed in the limited practice deficiency correction program. Multiple areas have been reviewed, including HQ, host units, and a specific enclave.

In order to properly report the findings, the Lead Assessor MUST:

A.

Identify items that were moved to the POA&M.

B.

Confirm the final findings are aggregated to the OSC level.

C.

Record the agreements made with the OSC Assessment Official.

D.

Ensure the report includes all of the evidence that has been collected.

Full Access
Question # 16

The OSC’s network consists of a single network switch that connects all devices. This includes the OSC’s OT equipment, which processes CUI. The OT controller requires an unsupported operating system.

What can the Lead Assessor BEST conclude about the overall compliance with MA.L2-3.7.1: Perform Maintenance?

A.

It is MET only if every asset that is not a Specialized Asset is maintained.

B.

It is MET only if the environments are demarcated on the baseline diagram.

C.

It is NOT MET because industrial equipment should not be processing CUI.

D.

It is NOT MET because the OSC has not managed the risk of a CUI system being outdated.

Full Access
Question # 17

An organization has contracted with a third party for system maintenance and support. The third-party personnel all work remotely. Which of the following should an assessor assure is in place?

A.

Only third-party personnel can perform system maintenance functions.

B.

Third-party personnel need to be identified and monitored while performing maintenance.

C.

The number of third-party personnel who can access the organization’s systems concurrently is limited.

D.

Remote access to systems used by the third party for maintenance functions is terminated automatically based on a defined set of criteria.

Full Access
Question # 18

While conducting a Level 2 Assessment, the Assessment Team begins reviewing assessment objects. The team identifies concerns with several of the objects presented. Which artifacts would require the MOST verification?

A.

Current artifacts produced by individuals performing the work

B.

Artifacts created 18 months ago by individuals performing the work

C.

Current artifacts produced by individuals that work for a separate entity of the company

D.

Artifacts created 18 months ago by individuals that work for a separate entity of the company

Full Access
Question # 19

AC.L2-3.1.6: Non-Privileged Account Use is being assessed. Which procedure BEST meets all of the standards for non-privileged account use?

A.

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for security tasks.

B.

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their non-privileged account for security tasks.

C.

All non-IT employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for all tasks.

D.

All non-IT employees are given a non-privileged user account.

System Administrators are given only an administrator account.

System Administrators use their administrator account for all tasks.

Full Access
Question # 20

An assessor reviews the OSC’s data protection policy, which requires full disk encryption on company laptops. While interviewing employees, the assessor learns that employees sometimes access data while teleworking on laptops that do not have full disk encryption.

How should the assessor view the implementation of the OSC’s policy?

A.

Acceptable because it requires full disk encryption of company laptops.

B.

Insufficient because there are teleworking instances where the policy is not followed.

C.

Acceptable as long as an equivalent technical safeguard is implemented for all teleworking scenarios.

D.

Insufficient because full disk encryption is not required for laptops to comply with CMMC requirements.

Full Access
Question # 21

An organization’s password policy includes these requirements:

    Passwords must be at least 8 characters in length.

    Passwords must contain at least one uppercase character, one lowercase character, and one numeric digit.

    Passwords must be changed at least every 90 days.

    When a password is changed, none of the previous 3 passwords can be reused.

Per IA.L2-3.5.7: Password Complexity, what requirement is missing from this password policy?

A.

It does not require MFA.

B.

It does not include a list of prohibited passwords.

C.

It does not specify a minimum change of character requirement.

D.

It does not require the password to contain at least one special character.

Full Access
Question # 22

In completing the assessment of practices in the Access Control (AC) domain, a CCA scored AC.L2-3.1.15: Privileged Remote Access as NOT MET. The OSC was notified of this deficiency at the end of day two of the assessment. On day five of the assessment, the OSC’s Assessment Official contacted the CCA to provide evidence that the deficiencies have been corrected.

What is the CCA’s NEXT step?

A.

This practice is not eligible for deficiency correction and should be scored as NOT MET.

B.

This practice is not eligible for deficiency correction, should be scored as NOT MET, and reevaluated during a POA&M Close-Out Assessment.

C.

This practice is eligible for deficiency correction and should be scored as MET but must be reevaluated during a POA&M Close-Out Assessment.

D.

This practice is eligible for deficiency correction, should be scored as NOT MET, and evaluated during the Limited Deficiency Correction evaluation.

Full Access
Question # 23

Some OSCs share real estate with other companies. To protect FCI/CUI behind unmanned entrances to buildings, floors, or other areas where FCI/CUI is created, used, stored, or transmitted, which of the following is the BEST method?

A.

Turnstiles to limit access

B.

Cameras to monitor and record foot traffic

C.

Bold signage with strong language to discourage entry

D.

One-way gates which require proper credentials or intercom authorization to unlock and permit entry

Full Access
Question # 24

An OSC seeking Level 2 certification is reviewing the physical security of their building. Currently, the building manager unlocks and locks the doors for business operations. The OSC would like the ability to automatically unlock the door for authorized personnel, track access individually, and maintain access history for all personnel. The BEST approach is for the OSC to:

A.

Maintain a list of authorized personnel and assign them a building key.

B.

Maintain security cameras to continuously monitor access to the building.

C.

Install a badge system and require each individual to use their badge to gain entry to the building.

D.

Install a keypad system and require the entry code to be changed when an individual leaves the company.

Full Access
Question # 25

An OSC uses an External Service Provider (ESP) to support part of its CUI processing scope. The OSC has selected an accredited ESP with FedRAMP MODERATE authorization. The OSC has a contract requiring the ESP to meet its security requirements. The ESP has provided a Shared Responsibility Matrix (SRM) consistent with the contract terms.

When assessing these assets, what should the assessor MOST carefully review?

A.

The contract terms to ensure that the OSC’s CMMC Level 2 requirements are in the contract, and the SRM to ensure that the shared responsibilities are well defined.

B.

The contract terms to ensure that the OSC’s CMMC Level 2 requirements are in the contract, and the SRM to ensure that the ESP’s responsibilities are well defined.

C.

The ESP’s FedRAMP MODERATE authorization to ensure the OSC’s CMMC Level 2 requirements are MET, and the SRM to ensure that the ESP’s responsibilities are well defined.

D.

The ESP’s FedRAMP MODERATE authorization to ensure the OSC’s CMMC Level 2 requirements are MET, and the SRM to ensure that the shared responsibilities are well defined.

Full Access
Question # 26

An OSC is undergoing CMMC Assessment on an enterprise-wide basis. While walking to the conference room, the Assessor notices a printer repair technician in the hallway, unescorted, repairing a printer marked “Authorized for CUI printing.” What is the NEXT step the Lead Assessor should take regarding PE.L2-3.10.3: Escort Visitors?

A.

Make a note and score the practice as MET

B.

Ask the printer technician to leave immediately

C.

Make a note and score the practice as NOT MET

D.

Ask the OSC if the printer technician has authorized access

Full Access
Question # 27

In validating the OSC’s implementation of AC.L2-3.1.16: Wireless Access Authorization, the CCA observes various personal and non-enterprise devices connected to the OSC’s Wi-Fi. Because organizations handle wireless access differently, the CCA must locate evidence showing who has ultimate authority over wireless access. Which authority is acceptable for authorizing wireless access?

A.

The CEO mandating IT to add their personal phone to the company Wi-Fi

B.

A written policy executed by the CEO listing the pre-authorization requirements for Wi-Fi connectivity

C.

The CEO emailing the company instructing everyone to put personal devices on the company Wi-Fi

D.

A detailed document from the head of IT with instructions on how to connect to the guest Wi-Fi network

Full Access
Question # 28

The Lead Assessor is ready to complete planning by developing the assessment schedule. The Lead Assessor and the OSC Assessment Official discuss the Assessment Team members.

What MUST be submitted to the Cyber-AB before the assessment?

A.

Individual travel plans

B.

Non-disclosure agreements

C.

Verified NIST SP 800-171 assessor qualifications

D.

Absence of Conflict of Interest and Confirmation Statement

Full Access
Question # 29

A company has a CUI enclave for handling all CUI processed, stored, and transmitted through the organization. While interviewing the IT manager, the CCA asks how assets that can, but are not intended to, handle CUI are identified. The IT manager refers to the CUI system’s network diagram (which includes these assets) as well as the asset inventory (which lists these assets as Contractor Risk Managed Assets). Which other artifact MUST also mention these assets?

A.

The identification and authentication policy should show how these assets are identified.

B.

The physical protection policy should list these assets as being part of the physical environment of the organization.

C.

The awareness and training program should include these assets so they are covered for all employees.

D.

The SSP should show these assets are managed using the company’s risk-based security policies, procedures, and practices.

Full Access
Question # 30

During an assessment, the OSC IT security team provided documentation on how they use replay-resistant authentication to protect CUI. What can be used as a replay-resistant mechanism?

A.

Encrypted messages

B.

Biometric techniques

C.

Requiring Transport Layer Security (TLS)

D.

MFA devices to protect access for local users

Full Access
Question # 31

An in-house compliance expert for a large defense contractor is reviewing the organization’s training materials for personnel handling CUI. After a widely publicized insider threat incident, management requires that training address insider threat risks. What is a critical component of insider threat awareness training?

A.

A bounty system for identifying and stopping insider threats

B.

A company-wide ranking of individuals by insider threat risk

C.

Law enforcement case studies on known insider threat activities

D.

Processes and procedures for reporting suspected insider threat activity

Full Access
Question # 32

During a CMMC Level 2 Assessment, a CCA interviewed a system administrator on the OSC’s procedures around configuration management and endpoint security. The system administrator described how they build and deploy new systems, and noted that some users require specialized applications for their jobs. Users have been asked to email IT when they install and run an additional application so IT can add it to their list of allowed software.

What must the CCA conclude?

A.

The OSC has properly implemented application deny listing.

B.

The OSC has not properly implemented application allow listing.

C.

IT must deploy an application to report newly installed software.

D.

IT does not have a policy that users notify IT when they install new applications.

Full Access
Question # 33

What should the Lead Assessor do to BEST ensure the evidence supplied effectively meets the intent of the standard for a practice?

A.

Ensure the evidence for each objective under a practice is adequate.

B.

Ensure the evidence is sufficient to meet the requirements for a practice.

C.

Ensure the evidence is complete, validated, and can be mapped to the practice requirements.

D.

Ensure the evidence covers all the scope and the identified organizations and corresponds to the practice and objectives.

Full Access
Question # 34

An OSC assigns new hires to work on their hire date. Human Resources ensures that all screening activities are completed before the end of the employees’ first week. How should the CCA score PS.L2-3.9.1: Screen Individuals?

A.

As NOT MET but it can be remediated post-assessment

B.

As NOT MET and this will cause the assessment to fail

C.

As MET since the OSC ensured Human Resources was handling the screening

D.

As NOT MET because all screening must be completed prior to the start of employment

Full Access
Question # 35

The audit team is discussing the OSC’s Risk Managed Assets. For these types of assets, the contractor need NOT:

A.

Provide a network diagram of the assessment scope.

B.

Ensure they are included in the pre-assessment discussion.

C.

Prepare for the assets to be assessed against CMMC practices.

D.

Show how they are being managed using organizational security policies.

Full Access
Question # 36

An OSC leases several servers and rack space in a FedRAMP MODERATE authorized colocation data center. Additional servers operate in a LAN room within the company’s facility. Both facilities are within the OSC’s assessment boundary. In order to assess the physical protection of the environment, the Assessor MUST physically examine the visitor and access controls in place in the:

A.

Data center

B.

OSC’s facility

C.

OSC’s facility and the data center

D.

OSC’s facility and the data center’s customer relationship management regarding physical security

Full Access
Question # 37

An OSC uses a colocation facility to house its CUI assets. The colocation restricts access to the data center via keycard and requires all entrants to sign in and out. The OSC’s cage and cabinets are further secured with keys accessible only to OSC-authorized personnel.

In order to assess physical controls, the CCA should:

A.

Physically visit the colocation facility to determine the effectiveness of controls.

B.

Evaluate the colocation facility security process as listed in the service agreement.

C.

Physically visit the colocation facility to determine the effectiveness of controls and review the OSC’s process for maintaining access to the keys.

D.

Evaluate the colocation facility security process as listed in the service agreement and review the OSC’s process for maintaining access to the keys.

Full Access
Question # 38

A company has multiple sites with employees at each site that must access the company’s CUI network from their remote locations. The company has set up a single access point for all employees to access the network. What is the MOST significant factor in determining whether the security on this single access point is adequate?

A.

Remote access is secured and monitored.

B.

Physical access is monitored and controlled.

C.

The security requirements for CUI and FCI are documented.

D.

The remote personnel have notification procedures regarding connection issues.

Full Access
Question # 39

A CCA is assessing the implementation of the Incident Reporting practice. To validate the control, what MUST the CCA ensure about the OSC?

A.

Incidents are tracked and documented

B.

Incident sources are configured and tuned

C.

Law enforcement officials are automatically notified during an incident

D.

Forensic investigations are performed to determine the impact of the incident

Full Access
Question # 40

FIPS-validated cryptography is required to meet CMMC practices that protect CUI when transmitted or stored outside the OSC’s CMMC enclave. What source does the CCA use to verify that the cryptography the OSC has implemented is FIPS-validated?

A.

Cryptographic section of the OSC’s SSP

B.

Vendor cryptographic module documentation

C.

NIST Module Validation Program

D.

Cryptographic section of the Shared Responsibility Matrix

Full Access
Question # 41

A CCA is assessing the implementation of SC.L2-3.13.7: Split Tunneling control via the examine method. Which scenario MUST be correct to determine if the practice is MET?

A.

The CCA tested that VPN mechanisms disallow split tunneling.

B.

The CCA corroborated that split tunneling is disabled with a system or network administrator.

C.

The CCA determined that split tunneling mechanisms have been disabled based on the system hardware, software, and architecture.

D.

The CCA evaluated that split tunneling mechanisms have been disabled based on the mechanisms supporting or restricting non-remote connections.

Full Access
Question # 42

A CCA is conducting an interview with an OSC team member about an offering from a well-known Cloud Service Provider (CSP). The offering is known to be secure, but the OSC has not provided evidence and the person being interviewed is unsure how the offering works. Will this offering be accepted by the Assessment Team?

A.

Yes, because of the process of reciprocity

B.

No, the OSC failed to train on the offering

C.

No, because the OSC lacks adequate and sufficient evidence

D.

Yes, because the CSP offering is a well-known, secure offering

Full Access
Question # 43

The OSC has not implemented cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission, citing the use of alternative physical safeguards.

Which of the following is NOT an alternative physical safeguard in this scenario?

A.

Trusted couriers

B.

Lockable casings

C.

Physical access site monitoring

D.

Tamper protections technologies

Full Access
Question # 44

A Lead Assessor is conducting an assessment for an OSC. The Lead Assessor is collecting evidence regarding the OSC’s network separation techniques. Which technique would be considered a logical separation technique and would fall within the scope of the assessment?

A.

Data loss alerting configured at the edge of the network containing CUI assets

B.

Access limitation based on badge access assigned to employees based on role

C.

Role-based access control within a properly implemented identity and access management tool

D.

A proxy-configured firewall that prevents data from flowing along the physical connection path

Full Access
Question # 45

While conducting a CMMC Level 2 self-assessment, an organization’s Chief Information Security Officer asks the system administrator for evidence that remote access is routed through fully managed access control points. Which documentation would BEST demonstrate that all remote access is routed through managed access control points?

A.

Network diagram and VPN logs

B.

Access control policy and procedures

C.

SSP and vendor management

D.

Cloud service audit logs and hardware asset inventory

Full Access