Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cyber AB > CMMC > CMMC-CCA

CMMC-CCA Certified CMMC Assessor (CCA) Exam Question and Answers

Question # 4

During an assessment, the OSC person being interviewed explains the process for escorting visitors. The individual states that while all visitors are escorted, occasionally a vendor may need access to a small room with only one door and limited standing room. In these cases, the escort sits outside the room and observes the vendor completing the work. Is this practice in line with the escort policy?

A.

No, the escort is not allowed to sit down

B.

No, the escort must always be in the same room

C.

Yes, since the visitor can only use a single entry

D.

Yes, so long as the visitor’s actions can still be viewed by the escort

Full Access
Question # 5

An OSC is preparing for an assessment and wants to gather evidence that will be used by the Lead Assessor to determine the scope of the assessment. The OSC currently operates a hybrid network, with part of their infrastructure at their physical location and part of their infrastructure in a cloud environment.

What evidence should the OSC collect that would assist the Lead Assessor in determining cloud and hybrid environment constraints?

A.

Subnetworks list

B.

System inventory

C.

Company-owned hardware list

D.

Cloud Service Provider’s Customer Responsibility Matrix

Full Access
Question # 6

A company is undergoing a CMMC Level 2 Assessment. During the Conduct Assessment phase, an Assessment Team member is reviewing the policies and procedures in the incident response plan.

Which assessment method is being utilized?

A.

Test

B.

Examine

C.

Interview

D.

Observation

Full Access
Question # 7

A midsized professional services organization that frequently contracts with government entities is undergoing a CMMC Level 2 assessment. The CCA interviews IT leadership about their audit logging capabilities and determines that a third-party vendor is responsible for correlating and reviewing audit logs. During the interview, they discuss the process that has been implemented by the vendor to provide a monthly summary of their audit log review to the organization. What issue should the CCA resolve during the interview?

A.

The vendor has the ability to provide report generation.

B.

The vendor may not use the same authoritative time source.

C.

Audit logs must be reviewed on at least a weekly basis for CMMC requirements.

D.

Audit logs should not be correlated and reviewed by a third party as they may contain CUI.

Full Access
Question # 8

An OSC has built an enclave for its production environment. The enclave sits behind a firewall, with all equipment connected through a switch. There is a shipping workstation and physically connected label printer (used for the sales system, which does not process CUI) that the OSC claims are Contractor Risk Managed Assets (CRMA). Other than showing that the shipping workstation and label printer are not intended to store or transmit CUI, and documenting them in the SSP,

how BEST would the OSC show that the shipping workstation and label printer are Contractor Risk Managed Assets?

A.

Document in the asset inventory and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

B.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using vendor-recommended risk-based security practices; and include them in the network diagram.

C.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using the organization’s risk-based security policies and procedures; and include them in the network diagram.

D.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using industry risk-based security best practices; and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

Full Access
Question # 9

An assessor reviews the OSC’s data protection policy, which requires full disk encryption on company laptops. While interviewing employees, the assessor learns that employees sometimes access data while teleworking on laptops that do not have full disk encryption.

How should the assessor view the implementation of the OSC’s policy?

A.

Acceptable because it requires full disk encryption of company laptops.

B.

Insufficient because there are teleworking instances where the policy is not followed.

C.

Acceptable as long as an equivalent technical safeguard is implemented for all teleworking scenarios.

D.

Insufficient because full disk encryption is not required for laptops to comply with CMMC requirements.

Full Access
Question # 10

During an assessment, the team is interviewing the IT staff to understand the ways in which the organization protects backup data. Because the company’s backups contain CUI, the Lead Assessor asks the IT engineer which method is used to ensure that the confidentiality of the backup data is being protected. Which implementation is LEAST LIKELY to be acceptable?

A.

Alternative physical controls for site access

B.

Managing who has access to the information

C.

Physically securing devices and media that contain CUI

D.

Encrypting files or media using industry-standard encryption

Full Access
Question # 11

An OSC creates standard user accounts with limited capabilities and administrator accounts with full system access. A standard user initiates the uninstall of the anti-virus software, which is organizationally defined as a privileged function. Which of the following would indicate AC.L2-3.1.7: Privileged Functions is properly implemented?

A.

The antivirus software is not uninstalled.

B.

The antivirus software is successfully uninstalled.

C.

The antivirus software is not uninstalled, and the attempt is captured in an application audit log.

D.

The antivirus software is successfully uninstalled, and the event is captured in an application audit log.

Full Access
Question # 12

A CCA is assessing the concept of least functionality in accordance with CM.L2-3.4.6: Least Functionality.

Which method is the LEAST LIKELY to be useful as an assessment technique?

A.

Interview personnel with information security responsibilities.

B.

Interview personnel with application development responsibilities.

C.

Interview personnel who wrote the configuration management policy.

D.

Interview personnel with security configuration management responsibilities.

Full Access
Question # 13

A company employs an encrypted VPN to enhance confidentiality over remote connections. The CCA reads a document describing the VPN. It states the VPN allows automated monitoring and control of remote access sessions, helps detect cyberattacks, and supports auditing of remote access to ensure compliance with CMMC requirements.

What document is the CCA MOST LIKELY reviewing to see how these VPNs are controlled and monitored?

A.

Access Control Policy

B.

Media Protection Policy

C.

Audit and Accountability Policy

D.

Configuration Management Policy

Full Access
Question # 14

A company has multiple sites with employees at each site that must access the company’s CUI network from their remote locations. The company has set up a single access point for all employees to access the network. What is the MOST significant factor in determining whether the security on this single access point is adequate?

A.

Remote access is secured and monitored.

B.

Physical access is monitored and controlled.

C.

The security requirements for CUI and FCI are documented.

D.

The remote personnel have notification procedures regarding connection issues.

Full Access
Question # 15

An OSC is undergoing CMMC Assessment on an enterprise-wide basis. While walking to the conference room, the Assessor notices a printer repair technician in the hallway, unescorted, repairing a printer marked “Authorized for CUI printing.” What is the NEXT step the Lead Assessor should take regarding PE.L2-3.10.3: Escort Visitors?

A.

Make a note and score the practice as MET

B.

Ask the printer technician to leave immediately

C.

Make a note and score the practice as NOT MET

D.

Ask the OSC if the printer technician has authorized access

Full Access
Question # 16

During the assessment of a company, the CCA learns that 50% of employees work from home using remote access. After reviewing the Access Control policy and audit logs, the CCA is unsure how the system ensures only employees with correct privileges can access CUI. The CCA decides a Test of functionality is required. Which question is of the LEAST concern to the CCA?

A.

Are remote access sessions necessary?

B.

Are remote access sessions permitted?

C.

Are remote access sessions monitored?

D.

Are the types of permitted remote access identified?

Full Access
Question # 17

An OSC is preparing for assessment. Which item of evidence would show the OSC’s efforts to restrict physical access within the OSC’s environment?

A.

VPN configuration

B.

Switch configuration files

C.

Network architecture drawings

D.

Documented OSC procedures

Full Access
Question # 18

In validating the OSC’s implementation of AC.L2-3.1.16: Wireless Access Authorization, the CCA observes various personal and non-enterprise devices connected to the OSC’s Wi-Fi. Because organizations handle wireless access differently, the CCA must locate evidence showing who has ultimate authority over wireless access. Which authority is acceptable for authorizing wireless access?

A.

The CEO mandating IT to add their personal phone to the company Wi-Fi

B.

A written policy executed by the CEO listing the pre-authorization requirements for Wi-Fi connectivity

C.

The CEO emailing the company instructing everyone to put personal devices on the company Wi-Fi

D.

A detailed document from the head of IT with instructions on how to connect to the guest Wi-Fi network

Full Access
Question # 19

An OSC has a minimal physical footprint consisting only of network equipment, workstations, and a centralized domain environment. File storage is centralized in a third-party vendor’s FedRAMP Moderate authorized cloud environment, and employees access files using the cloud integration with their workstations. Since CUI is stored in the FedRAMP Moderate authorized environment, the OSC should prepare to have which environment(s) assessed?

A.

Cloud environment only

B.

OSC’s physical network only

C.

Cloud environment and the OSC’s physical network

D.

OSC’s physical network, the cloud environment, and the cloud vendor’s employee network

Full Access
Question # 20

A Lead Assessor is preparing to conduct a Level 2 Assessment for an OSC. The assessor already determined the assessment scope and systems included. In addition, the assessor requests:

    Results of the most recent OSC self-assessment or any pre-assessments by an RPO,

    The System Security Plan (SSP), and

    A list of all OSC staff who play a role in in-scope procedures.

Based on this information, which item would the assessor MOST LIKELY request when preparing to conduct a Level 2 Assessment?

A.

A list of objectives

B.

A manual for each system

C.

A preliminary list of the anticipated evidence

D.

A list of assets that are determined to be out-of-scope

Full Access
Question # 21

While assessing a company, the CCA is determining whether the company controls and manages connections between its corporate network and all external networks. The company has: (1) a strict employee policy prohibiting personal Internet use and personal email on company computers, and (2) firewalls plus a connection allow-list so only authorized external networks can connect to the company network. Are these safeguards sufficient to meet the applicable CMMC requirement?

A.

Yes. The company’s strict employee policy is the best practice for meeting the requirement.

B.

No. The company must isolate its system from all external connections to meet the requirement.

C.

Yes. The company’s firewalls and connection allow-lists are appropriate technical controls to meet the requirement.

D.

No. The company needs full control over all external systems it interfaces with to meet the requirement.

Full Access
Question # 22

The Lead Assessor and OSC Assessment Official determined the resources, cost, and schedule for an upcoming assessment. The Lead Assessor noted the OSC Assessment Official’s preferences regarding the limits of the method and the consequent resource, cost, and schedule constraints to arrive at an optimal Assessment Plan. In this situation, who has responsibility for signing the planning agreement?

A.

Lead Assessor

B.

OSC Assessment Official

C.

OSC Assessment Official and Lead Assessor

D.

OSC Assessment Official, Lead Assessor, and C3PAO

Full Access
Question # 23

An assessor is examining an organization’s system maintenance program. While reviewing the system maintenance policy and the OSC’s maintenance records for the CUI network, the assessor notices there is no mention of printers. The assessor asks the IT manager if the company has any printers.

Why is the assessor concerned if the OSC has printers?

A.

Printers must be completely isolated from all non-CUI assets.

B.

Firmware on a network printer needs to have updates as needed.

C.

Printers cannot be used on a CUI network without government approval.

D.

Printers can produce hard copies of CUI data that need to be safeguarded.

Full Access
Question # 24

A company has a firewall to regulate how data flows into and out of its network. Based on an interview with their IT staff, all connections to their systems are logged, and suspicious traffic generates alerts. Examination of which artifact should give the CCA the details on how these are implemented?

A.

Physical access logs

B.

Boundary protection procedures

C.

Account management document

D.

Configuration management policy

Full Access
Question # 25

An OSC has contracted a C3PAO to perform a Level 2 Assessment. As the Lead Assessor is analyzing the assessment requirements, it is found that the OSC does not have a document detailing the assessment scope. How can this problem BEST be fixed?

A.

The Assessment Team is supposed to generate the document before moving forward.

B.

The CCA tells the OSC they must provide the document before the assessment can begin.

C.

The OSC and the Lead Assessor jointly create the document at the beginning of the assessment.

D.

The Lead Assessor can regulate the assessment and create/adjust the document moving forward.

Full Access
Question # 26

During an assessment, the IT security engineers responsible for password policy for the OSC provided documentation that all passwords are protected using a one-way hashing methodology. As a result, which statement is true?

A.

Passwords are protected in storage and in transit.

B.

Passwords are transmitted across the network as clear cipher-text.

C.

The password protection allows access but not authorization to assets.

D.

The transformation makes it impossible to re-convert the hashed password.

Full Access
Question # 27

During discussions with an OSC, the assessment team learned that many employees often need to work from remote locations and, as a result, are permitted to access the organization’s internal networks from those remote locations. To ensure secure remote access requirements are being met, remote access sessions need NOT be:

A.

Validated

B.

Identified

C.

Permitted

D.

Controlled

Full Access
Question # 28

An assessor is reviewing whether an organization appropriately analyzed the security impact of a new release of an application. Which of the following documents is MOST useful for the assessor to review?

A.

A description of the change from the software vendor

B.

Change Control Board (CCB) meeting minutes and supporting documents

C.

System audit logs showing that the change occurred, when, and by whom

D.

A log of security incidents/issues after the change was implemented

Full Access
Question # 29

During a CMMC Assessment, the assessor is determining if the Escort Visitors practice is MET. Personnel with which of the following responsibilities would be MOST appropriate to interview?

A.

Repair and facilities maintenance

B.

Local access control and information security

C.

Physical access control and information security

D.

Information technology management and operations

Full Access
Question # 30

While conducting a CMMC Level 2 Third-Party Assessment of a small defense contractor, an assessor discovers that the contractor’s Information Security Policy has no documented change records demonstrating executive approval. The IT director states that they will add change records in the future, but that other evidence exists. Which documentation is MOST able to demonstrate persistent and habitual adherence to CMMC requirements?

A.

Handwritten notes from executive committee meetings discussing implementation

B.

Several years’ worth of saved emails from the executive team approving policies and directing adherence

C.

A notarized letter from the previous CEO stating that they approved information security policies annually

D.

Transcribed interviews with new employees discussing their understanding of information security policies

Full Access
Question # 31

An OSC outsources all of its security incident and event monitoring work to a third-party SOC. Additionally, the OSC utilizes a cloud-hosted antivirus (AV) system to fulfill the requirement of having virus protection without hosting additional servers on-site.

During the scoping discussion, both the SOC and AV should be listed as what type of asset?

A.

They are CUI Assets due to their operation within a CUI network.

B.

They are Out-of-Scope Assets due to being fully hosted/operated by third parties.

C.

They are Security Protection Assets due to their performance of security functions.

D.

They are Contractor Risk Managed Assets because they are not physically or logically isolated from CUI assets.

Full Access
Question # 32

The Lead Assessor is planning to conduct an assessment for an OSC. The Assessor has been given a preliminary asset inventory list by the OSC. How would the Lead Assessor determine if any assets are out-of-scope for the assessment?

A.

All assets in an OSC’s inventory fall within the scope of the assessment and, as such, should be assessed against the CMMC practices.

B.

None of the assets in an OSC’s inventory fall within the scope of the assessment and, as such, should not be assessed against the CMMC practices.

C.

Assets cannot process, store, or transmit CUI because they are physically or logically separated from CUI assets, or they are inherently unable to do so.

D.

Out-of-Scope Assets can process, store, or transmit CUI because they do not need to be physically or logically separated.

Full Access
Question # 33

An OSC has a hardware and software list used to manage company assets. Which is the BEST evidence to show the OSC is managing the system baseline?

A.

Media protection

B.

Physical protection

C.

Configuration management

D.

Identification and authentication policy

Full Access
Question # 34

During preparations for a CMMC Level 2 Assessment, a client submits a request to their consulting RP to learn more about Specialized Asset requirements. The client is unsure if their camera system, used for safety data collection purposes within their machining shop, should be documented within the SSP. Which reason is a satisfactory reason to exclude the camera system from the SSP, and thus the assessment scope?

A.

The video data are deleted every seven days.

B.

The Technology Control Plan does not address the camera system.

C.

The camera data are uploaded to a FedRAMP MODERATE authorized cloud storage system.

D.

The camera system network is physically and logically isolated and does not capture data related to controlled projects.

Full Access
Question # 35

Video monitoring is used by an OSC to help meet PE.L2-3.10.2: Monitor Facility. The OSC’s building has three external doors, each with badge access and a network-connected video camera above the door. The video cameras are connected to the same network as employee computers. The OSC contracted a local security company to provide surveillance services. The security company stores the recordings at its premises and requires access to the OSC’s network to manage the video cameras. Which factor is a clear negative finding for the OSC’s assessment?

A.

Video surveillance needs to be of both private and public areas of the building

B.

A non-certified third party accesses the OSC’s network to manage the cameras

C.

Video surveillance alone does not satisfy the facility monitoring requirement of PE.L2-3.10.2

D.

A non-certified third party’s data center may not store video recordings for a company authorized to process CUI

Full Access
Question # 36

An OSC seeking Level 2 certification has recently configured system auditing capabilities for all systems within the assessment scope. The audit logs are generated based on the required events and contain the correct content that the organization has defined.

Which of the following BEST describes the next system auditing objective that the organization should define?

A.

Centralized audit log collection

B.

Integration of all system audit logs

C.

Review and update of logged events

D.

Retention requirements for audit records

Full Access
Question # 37

The team is assessing an OSC that uses the cloud for hosting its online services. Which of the following is NOT important for the assessor to consider?

A.

Devices connecting to the system are authorized.

B.

Processes acting on behalf of a user are authenticated.

C.

Users are authorized as a prerequisite to system access.

D.

FIPS encryption is authenticated as a prerequisite to system access.

Full Access
Question # 38

An OSC leases several servers and rack space in a FedRAMP MODERATE authorized colocation data center. Additional servers operate in a LAN room within the company’s facility. Both facilities are within the OSC’s assessment boundary. In order to assess the physical protection of the environment, the Assessor MUST physically examine the visitor and access controls in place in the:

A.

Data center

B.

OSC’s facility

C.

OSC’s facility and the data center

D.

OSC’s facility and the data center’s customer relationship management regarding physical security

Full Access
Question # 39

During a CMMC Level 2 Assessment, a CCA interviewed a system administrator on the OSC’s procedures around configuration management and endpoint security. The system administrator described how they build and deploy new systems, and noted that some users require specialized applications for their jobs. Users have been asked to email IT when they install and run an additional application so IT can add it to their list of allowed software.

What must the CCA conclude?

A.

The OSC has properly implemented application deny listing.

B.

The OSC has not properly implemented application allow listing.

C.

IT must deploy an application to report newly installed software.

D.

IT does not have a policy that users notify IT when they install new applications.

Full Access
Question # 40

An OSC seeking Level 2 certification is migrating to a fully cloud-based environment. The organization wants to select a Cloud Service Provider (CSP) that can share responsibilities for CMMC Level 2 requirements. Assume both CSPs can equally provide the technical capabilities and business value required.

    CSP A has SOC 2 certification and is California Consumer Privacy Act (CCPA) and Health Insurance Portability and Accountability Act (HIPAA) compliant.

    CSP B has SOC 2 and FedRAMP Moderate certifications.

Based on this information, which CSP is MOST LIKELY to be acceptable?

A.

CSP A

B.

CSP B

C.

Both CSP A and B

D.

Neither CSP A nor B

Full Access
Question # 41

A company describes its organization as having two systems. One system, System Org, covers the entire organization and allows instant messaging, email, and Internet activity. The other system, System CUI, is used for processing, storing, and transmitting CUI data. System CUI interfaces with System Org through security mechanisms and a firewall.

The CMMC Assessment is being done on System CUI only.

What is the BEST way to describe System CUI?

A.

CUI Assets

B.

In-Scope Assets

C.

Out-of-Scope Assets

D.

CUI Assets and Security Protection Assets

Full Access
Question # 42

What is NOT required for the Lead Assessor to confirm when verifying readiness to conduct an assessment?

A.

That risks have been identified

B.

That necessary logistics have been arranged

C.

Whether the OSC can better meet the targeted CMMC Level

D.

That evidence is available and accessible for the targeted CMMC Level

Full Access
Question # 43

A company has a CUI enclave for handling all CUI processed, stored, and transmitted through the organization. While interviewing the IT manager, the CCA asks how assets that can, but are not intended to, handle CUI are identified. The IT manager refers to the CUI system’s network diagram (which includes these assets) as well as the asset inventory (which lists these assets as Contractor Risk Managed Assets). Which other artifact MUST also mention these assets?

A.

The identification and authentication policy should show how these assets are identified.

B.

The physical protection policy should list these assets as being part of the physical environment of the organization.

C.

The awareness and training program should include these assets so they are covered for all employees.

D.

The SSP should show these assets are managed using the company’s risk-based security policies, procedures, and practices.

Full Access
Question # 44

While scoring the evidence for a particular CMMC practice, the Certified Assessor notes that one of the practice objectives is NOT MET, thereby scoring the entire practice as NOT MET. The OSC Assessment Official disagrees with the Certified Assessor’s decision, and they both take the dispute to the Lead Assessor, who is unable to resolve the issue to the OSC’s satisfaction.

How will this dispute be settled?

A.

The Lead Assessor is the final arbiter of the dispute.

B.

The OSC can supply adequate proof to the Cyber-AB to overturn the decision.

C.

The Certified Assessor is certified and, as such, the decision will stand.

D.

The Lead Assessor will present the dispute to the C3PAO Official, who will make a ruling.

Full Access
Question # 45

The assessor begins the assessment by meeting with the client’s stakeholders and learns that multiple subsidiaries exist. In order to perform a complete assessment, the assessor must review documents from multiple entities as multiple, corresponding Commercial and Government Entity (CAGE) codes were provided. Which of the following entities may receive certification as a result of this?

A.

HQ organization

B.

HQ organization and Host unit

C.

Host unit and Supporting Organizations/Units

D.

HQ organization, Host unit, and Supporting Organizations/Units

Full Access