Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Cyber AB > CMMC > CMMC-CCP

CMMC-CCP Certified CMMC Professional (CCP) Exam Question and Answers

Question # 4

The Lead Assessor is presenting the Final Findings Presentation to the OSC. During the presentation, the Assessment Sponsor and OSC staff inform the assessor that they do not agree with the assessment results. Who has the final authority for the assessment results?

A.

C3PAO

B.

CMMC-AB

C.

Assessment Team

D.

Assessment Sponsor

Full Access
Question # 5

A client uses an external cloud-based service to store, process, or transmit data that is reasonably believed to qualify as CUI. According to DFARS clause 252.204-7012. what set of established security requirements MUST that cloud provider meet?

A.

FedRAMP Low

B.

FedRAMP Moderate

C.

FedRAMP High

D.

FedRAMP Secure

Full Access
Question # 6

Which MINIMUM Level of certification must a contractor successfully achieve to receive a contract award requiring the handling of CUI?

A.

Level 1

B.

Level 2

C.

Level 3

D.

Any level

Full Access
Question # 7

The Advanced Level in CMMC will contain Access Control {AC) practices from:

A.

Level 1.

B.

Level 3.

C.

Levels 1 and 2.

D.

Levels 1,2, and 3.

Full Access
Question # 8

Which assessment method describes the process of reviewing, inspecting, observing, studying, or analyzing assessment objects (i.e., specification, mechanisms, activities)?

A.

Test

B.

Assess

C.

Examine

D.

Interview

Full Access
Question # 9

Which document is the BEST source for determining the sources of evidence for a given practice?

A.

NISTSP 800-53

B.

NISTSP 800-53A

C.

CMMC Assessment Scope

D.

CMMC Assessment Guide

Full Access
Question # 10

What type of information is NOT intended for public release and is provided by or generated for the government under a contract to develop or deliver a product or service to the government, but not including information provided by the government to the public (such as on public websites) or simple transactional information, such as necessary to process payments?

A.

CDI

B.

CTI

C.

CUI

D.

FCI

Full Access
Question # 11

While determining the scope for a company's CMMC Level 1 Self-Assessment, the contract administrator includes the hosting providers that manage their IT infrastructure. Which asset type BEST describes the third-party organization?

A.

ESPs

B.

People

C.

Facilities

D.

Technology

Full Access
Question # 12

Two network administrators are working together to determine a network configuration in preparation for CMMC. The administrators find that they disagree on a couple of small items. Which solution is the BEST way to ensure compliance with CMMC?

A.

Consult with the CEO of the company.

B.

Consult the CMMC Assessment Guides and NIST SP 800-171.

C.

Go with the network administrator's ideas with the least stringent controls.

D.

Go with the network administrator's ideas with the most stringent controls.

Full Access
Question # 13

Which organization is the governmental authority responsible for identifying and marking CUI?

A.

NARA

B.

NIST

C.

CMMC-AB

D.

Department of Homeland Security

Full Access
Question # 14

An organization's sales representative is tasked with entering FCI data into various fields within a spreadsheet on a company-issued laptop. This laptop is an FCI Asset being used to:

A.

process and transmit FCI.

B.

process and organize FCI.

C.

store, process, and transmit FCI.

D.

store, process, and organize FCI.

Full Access
Question # 15

An organization that manufactures night vision cameras is looking for help to address the gaps identified in physical access control systems. Which certified individual should they approach for implementation support?

A.

CCA of the C3PAO performing the assessment

B.

RP of an organization not part of the assessment

C.

Practitioner of the organization performing the assessment LTP

D.

DoD Contract Official of the organization performing the assessment

Full Access
Question # 16

Which phase of the CMMC Assessment Process includes the task to identify, obtain inventory, and verify evidence?

A.

Phase 1: Plan and Prepare Assessment

B.

Phase 2: Conduct Assessment

C.

Phase 3: Report Recommended Assessment Results

D.

Phase 4: Remediation of Outstanding Assessment Issues

Full Access
Question # 17

A contractor provides services and data to the DoD. The transactions that occur to handle FCI take place over the contractor's business network, but the work is performed on contractor-owned systems, which must be configured based on government requirements and are used to support a contract. What type of Specialized Asset are these systems?

A.

loT

B.

Restricted IS

C.

Test equipment

D.

Government property

Full Access
Question # 18

Which statement BEST describes the requirements for a C3PA0?

A.

An authorized C3PAO must meet some DoD and all ISO/IEC 17020 requirements.

B.

An accredited C3PAO must meet all DoD and some ISO/IEC 17020 requirements.

C.

AC3PAO must be accredited by DoD before being able to conduct assessments.

D.

A C3PAO must be authorized by CMMC-AB before being able to conduct assessments.

Full Access
Question # 19

Which standard of assessment do all C3PAO organizations execute an assessment methodology based on?

A.

ISO 27001

B.

NISTSP800-53A

C.

CMMC Assessment Process

D.

Government Accountability Office Yellow Book

Full Access
Question # 20

A Lead Assessor is performing a CMMC readiness review. The Lead Assessor has already recorded the assessment risk status and the overall assessment feasibility. At MINIMUM, what remaining readiness review criteria should be verified?

A.

Determine the practice pass/fail results.

B.

Determine the preliminary recommended findings.

C.

Determine the initial model practice ratings and record them.

D.

Determine the logistics. Assessment Team, and the evidence readiness.

Full Access
Question # 21

A CCP is working as an Assessment Team Member on a CMMC Level 2 Assessment. The Lead Assessor has assigned the CCP to assess the OSC's Configuration Management (CM) domain. The CCP's first interview is with a subject-matter expert for user-installed software. With respect to user-installed software, what facet should the CCP's interview focus on?

A.

Controlled and monitored

B.

Removed from the system

C.

Scanned for malicious code

D.

Limited to mission-essential use only

Full Access
Question # 22

When planning an assessment, the Lead Assessor should work with the OSC to select personnel to be interviewed who could:

A.

have a security clearance.

B.

be a senior person in the company.

C.

demonstrate expertise on the CMMC requirements.

D.

provide clarity and understanding of their practice activities.

Full Access
Question # 23

During the assessment process, who is the final interpretation authority for recommended findings?

A.

C3PAO

B.

CMMC-AB

C.

OSC sponsor

D.

Assessment Team Members

Full Access
Question # 24

The Lead Assessor interviews a network security specialist of an OSC. The incident monitoring report for the month shows that no security incidents were reported from OSC's external SOC service provider. This is provided as evidence for RA.L2-3.11.2: Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified. Based on this information, the Lead Assessor should conclude that the evidence is:

A.

inadequate because it is irrelevant to the practice.

B.

adequate because it fits well for expected artifacts.

C.

adequate because no security incidents were reported.

D.

inadequate because the OSC's service provider should be interviewed.

Full Access
Question # 25

An assessor needs to get the most accurate answers from an OSC's team members. What is the BEST method to ensure that the OSC's team members are able to describe team member responsibilities?

A.

Interview groups of people to get collective answers.

B.

Understand that testing is more important that interviews.

C.

Ensure confidentiality and non-attribution of team members.

D.

Let team members know the questions prior to the assessment.

Full Access
Question # 26

A Lead Assessor is presenting an assessment kickoff and opening briefing. What topic MUST be included?

A.

Gathering evidence

B.

Review of the OSC's SSP

C.

Overview of the assessment process

D.

Examination of the artifacts for sufficiency

Full Access
Question # 27

What type of criteria is used to answer the question "Does the Assessment Team have the right evidence?"

A.

Adequacy criteria

B.

Objectivity criteria

C.

Sufficiency criteria

D.

Subjectivity criteria

Full Access
Question # 28

Which NIST SP discusses protecting CUI in nonfederal systems and organizations?

A.

NIST SP 800-37

B.

NIST SP 800-53

C.

NIST SP 800-88

D.

NIST SP 800-171

Full Access
Question # 29

What is the BEST document to find the objectives of the assessment of each practice?

A.

CMMC Glossary

B.

CMMC Appendices

C.

CMMC Assessment Process

D.

CMMC Assessment Guide Levels 1 and 2

Full Access
Question # 30

A CCP is providing consulting services to a company who is an OSC. The CCP is preparing the OSC for a CMMC Level 2 assessment. The company has asked the CCP who is responsible for determining the CMMC Assessment Scope and who validates its CMMC Assessment Scope. How should the CCP respond?

A.

"The OSC determines the CMMC Assessment Scope, and the CCP validates the CMMC Assessment Scope."

B.

"The OSC determines the CMMC Assessment Scope, and the C3PAO validates the CMMC Assessment Scope."

C.

"The CMMC Lead Assessor determines the CMMC Assessment Scope, and the OSC validates the CMMC Assessment Scope."

D.

"The CMMC C3PAO determines the CMMC Assessment Scope, and the Lead Assessor validates the CMMC Assessment Scope."

Full Access
Question # 31

A defense contractor needs to share FCI with a subcontractor and sends this data in an email. The email system involved in this process is being used to:

A.

manage FCI.

B.

process FCI.

C.

transmit FCI.

D.

generate FCI

Full Access
Question # 32

Which domains are a part of a Level 1 Self-Assessment?

A.

Access Control (AC), Risk Management

B.

Risk Management (RM). Access Control (AC), and Physical Protection (PE)

C.

Access Control (AC), Physical Protection (PE), and Identification and Authentication (IA)

D.

Risk Management (RM). Media Protection (MP), and Identification and Authentication (IA)

Full Access
Question # 33

While conducting a CMMC Assessment, an individual from the OSC provides documentation to the assessor for review. The documentation states an incident response capability is established and contains information on incident preparation, detection, analysis, containment, recovery, and user response activities. Which CMMC practice is this documentation attesting to?

A.

IR.L2-3.6.1: Incident Handling

B.

IR.L2-3.6.2: Incident Reporting

C.

IR.L2-3.6.3: Incident Response Testing

D.

IR.L2-3.6.4: Incident Spillage

Full Access
Question # 34

How many domains does the CMMC Model consist of?

A.

14 domains

B.

43 domains

C.

72 domains

D.

110 domains

Full Access
Question # 35

A company is working with a CCP from a contracted CMMC consulting company. The CCP is asked where the Host Unit is required to document FCI and CUI for a CMMC Assessment. How should the CCP respond?

A.

"In the SSP. within the asset inventory, and in the network diagranY'

B.

"Within the hardware inventory, data (low diagram, and in the network diagram"

C.

"Within the asset inventory, in the proposal response, and in the network diagram"

D.

"In the network diagram, in the SSP. within the base inventory, and in the proposal response'"

Full Access
Question # 36

What is DFARS clause 252.204-7012 required for?

A.

All DoD solicitations and contracts

B.

Solicitations and contracts that use FAR part 12 procedures

C.

Procurements solely for the acquisition of commercial off-the-shelf

D.

Commercial off-the-shelf sold in the marketplace without modifications

Full Access
Question # 37

When assessing SI.L1-3.14.2: Provide protection from malicious code at appropriate locations within organizational information systems, evidence shows that all of the OSC's workstations and servers have antivirus software installed for malicious code protection. A centralized console for the antivirus software management is in place and records show that all devices have received the most updated antivirus patterns. What is the BEST determination that the Lead Assessor should reach regarding the evidence?

A.

It is sufficient, and the audit finding can be rated as MET.

B.

It is insufficient, and the audit finding can be rated NOT MET.

C.

It is sufficient, and the Lead Assessor should seek more evidence.

D.

It is insufficient, and the Lead Assessor should seek more evidence.

Full Access
Question # 38

An Assessment Team is conducting interviews with team members about their roles and responsibilities. The team member responsible for maintaining the antivirus program knows that it was deployed but has very little knowledge on how it works. Is this adequate for the practice?

A.

Yes, the antivirus program is available, so it is sufficient.

B.

Yes, antivirus programs are automated to run independently.

C.

No, the team member must know how the antivirus program is deployed and maintained.

D.

No, the team member's interview answers about deployment and maintenance are insufficient.

Full Access
Question # 39

Which document is the BEST source for descriptions of each practice or process contained within the various CMMC domains?

A.

CMMC Glossary

B.

CMMC Appendices

C.

CMMC Assessment Process

D.

CMMC Assessment Guide Levels 1 and 2

Full Access
Question # 40

What service is the MOST comprehensive that the RPO provides?

A.

Training services

B.

Education services

C.

Consulting services

D.

Assessment services

Full Access
Question # 41

A Level 2 Assessment of an OSC is winding down and the final results are being prepared to present to the OSC. When should the final results be delivered to the OSC?

A.

At the end of every day of the assessment

B.

Daily and during a final separately scheduled review

C.

Either at the final Daily Checkpoint, or during a separately scheduled findings and recommendation review

D.

Either after approval from the C3PAO. or during a separately scheduled final recommended findings review

Full Access
Question # 42

There are 15 practices that are NOT MET for an OSC's Level 2 Assessment. All practices are applicable to the OSC. Which determination should be reached?

A.

The OSC may have 90 days for remediating NOT MET practices.

B.

The OSC is not eligible for an option to remediate NOT MET practices.

C.

The OSC may be eligible for an option to remediate NOT MET practices.

D.

The OSC is not eligible for an option to remediate after the assessment is canceled.

Full Access
Question # 43

When are data and documents with legacy markings from or for the DoD required to be re-marked or redacted?

A.

When under the control of the DoD

B.

When the document is considered secret

C.

When a document is being shared outside of the organization

D.

When a derivative document's original information is not CUI

Full Access
Question # 44

An assessment procedure consists of an assessment objective, potential assessment methods, and assessment objects. Which statement is part of an assessment objective?

A.

Specifications and mechanisms

B.

Examination, interviews, and testing

C.

Determination statement related to the practice

D.

Exercising assessment objects under specified conditions

Full Access
Question # 45

A dedicated local printer is used to print out documents with FCI in an organization. This is considered an FCI Asset Which function BEST describes what the printer does with the FCI?

A.

Encrypt

B.

Manage

C.

Process

D.

Distribute

Full Access
Question # 46

How are the Final Recommended Assessment Findings BEST presented?

A.

Using the CMMC Findings Brief template

B.

Using a C3PAO-provided template that is preferred by the OSC

C.

Using a C3PAO-branded version of the CMMC Findings Brief template

D.

Using the proprietary template created by the Lead Assessor after approval from the C3PAO

Full Access
Question # 47

Which term describes "the protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to. or modification of information"?

A.

Adopted security

B.

Adaptive security

C.

Adequate security

D.

Advanced security

Full Access
Question # 48

In scoping a CMMC Level 1 Self-Assessment, it is determined that an ESP employee has access to FCI. What is the ESP employee considered?

A.

In scope

B.

Out of scope

C.

OSC point of contact

D.

Assessment Team Member

Full Access
Question # 49

The results package for a Level 2 Assessment is being submitted. What MUST a Final Report. CMMC Assessment Results include?

A.

Affirmation for each practice or control

B.

Documented rationale for each failed practice

C.

Suggested improvements for each failed practice

D.

Gaps or deltas due to any reciprocity model are recorded as met

Full Access
Question # 50

The practices in CMMC Level 2 consists of the security requirements specified in:

A.

NISTSP 800-53.

B.

NISTSP 800-171.

C.

48 CFR 52.204-21.

D.

DFARS 252.204-7012.

Full Access
Question # 51

During a Level 1 Self-Assessment, a smart thermostat was identified. It is connected to the Internet on the OSC's WiFi network. What type of asset is this?

A.

FCI Asset

B.

CUI Asset

C.

In-scope Asset

D.

Specialized Asset

Full Access