Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cyber AB > CMMC > CMMC-CCP

CMMC-CCP Certified CMMC Professional (CCP) Exam Question and Answers

Question # 4

How many domains does the CMMC Model consist of?

A.

14 domains

B.

43 domains

C.

72 domains

D.

110 domains

Full Access
Question # 5

What type of criteria is used to answer the question "Does the Assessment Team have the right evidence?"

A.

Adequacy criteria

B.

Objectivity criteria

C.

Sufficiency criteria

D.

Subjectivity criteria

Full Access
Question # 6

Which entity specifies the required CMMC Level in Requests for Information and Requests for Proposals?

A.

DoD

B.

NARA

C.

NIST

D.

Department of Homeland Security

Full Access
Question # 7

An assessment is being completed at a client site that is not far from the Lead Assessor's home office. The client provides a laptop for the duration of the engagement. During a meeting with the network engineers, the Lead Assessor requests information about the network. They respond that they have a significant number of drawings they can provide via their secure cloud storage service. The Lead Assessor returns to their home office and decides to review the documents. What is the BEST way to retrieve the documents?

A.

Log into the secure cloud storage service to save copies of the documents on both the work and client laptops.

B.

Log into the client VPN from the client laptop and retrieve the documents from the secure cloud storage service.

C.

Log into the client VPN from the assessor's laptop and retrieve the documents from the secure cloud storage service.

D.

Use their home office workstation to retrieve the documents from the secure cloud storage service and save them to a USB stick.

Full Access
Question # 8

In preparation for a CMMC Level 1 Self-Assessment, the IT manager for a DIB organization is documenting asset types in the company's SSP The manager determines that identified machine controllers and assembly machines should be documented as Specialized Assets. Which type of Specialized Assets has the manager identified and documented?

A.

loT

B.

Restricted IS

C.

Test equipment

D.

Operational technology

Full Access
Question # 9

A Lead Assessor and an OSC's Assessment Official have agreed to have the Assessment results presented during the final Daily Checkpoint of the OSC's CMMC Level 2 Assessment. Which document MUST the Lead Assessor use to present assessment findings to the OSC?

A.

CMMC POA & M Brief

B.

CMMC Findings Brief

C.

CMMC Assessment Tracker Tool

D.

CMMC Recommended Findings template

Full Access
Question # 10

How many cybersecurity levels does the CMMC Model structure contain?

A.

2 Levels.

B.

3 Levels.

C.

5 Levels.

D.

4 Levels.

Full Access
Question # 11

According to DFARS clause 252.204-7012, who is responsible for determining that Information in a given category should be considered CUI?

A.

The NARA CUI Executive Agent

B.

The contractor who generated the information

C.

The DoD agency for whom the contractor is performing the work

D.

The military personnel assigned to the contractor for that purpose

Full Access
Question # 12

Which standard and regulation requirements are the CMMC Model 2.0 based on?

A.

NIST SP 800-171 and NIST SP 800-172

B.

DFARS, FIPS 100, and NIST SP 800-171

C.

DFARS, NIST, and Carnegie Mellon University

D.

DFARS, FIPS 100, NIST SP 800-171, and Carnegie Mellon University

Full Access
Question # 13

Which principles are included in defining the CMMC-AB Code of Professional Conduct?

A.

Objectivity, classification, and information accuracy

B.

Objectivity, confidentiality, and information integrity

C.

Responsibility, classification, and information accuracy

D.

Responsibility, confidentiality, and information integrity

Full Access
Question # 14

In late September. CA.L2-3.12.1: Periodically assess the security controls in organizational systems to determine if the controls are effective in their application is assessed. Procedure specifies that a security control assessment shall be conducted quarterly. The Lead Assessor is only provided the first quarter assessment report because the person conducting the second quarter's assessment is currently out of the office and will return to the office in two hours. Based on this information, the Lead Assessor should determine that the evidence is;

A.

sufficient, and rate the audit finding as MET

B.

insufficient, and rate the audit finding as NOT MET.

C.

sufficient, and re-rate the audit finding after a quarter two assessment report is examined.

D.

insufficient, and re-rate the audit finding after a quarter two assessment report is examined.

Full Access
Question # 15

For the purpose of determining scope, what needs to be included as part of the assessment but would NOT receive a CMMC certification unless an enterprise assessment is conducted?

A.

ESP

B.

People

C.

Test equipment

D.

Government property

Full Access
Question # 16

Which organization is the governmental authority responsible for identifying and marking CUI?

A.

NARA

B.

NIST

C.

CMMC-AB

D.

Department of Homeland Security

Full Access
Question # 17

When assessing SI.L1-3.14.2: Provide protection from malicious code at appropriate locations within organizational information systems, evidence shows that all of the OSC's workstations and servers have antivirus software installed for malicious code protection. A centralized console for the antivirus software management is in place and records show that all devices have received the most updated antivirus patterns. What is the BEST determination that the Lead Assessor should reach regarding the evidence?

A.

It is sufficient, and the audit finding can be rated as MET.

B.

It is insufficient, and the audit finding can be rated NOT MET.

C.

It is sufficient, and the Lead Assessor should seek more evidence.

D.

It is insufficient, and the Lead Assessor should seek more evidence.

Full Access
Question # 18

When executing a remediation review, the Lead Assessor should:

A.

help OSC to complete planned remediation activities.

B.

plan two consecutive remediation reviews for an OSC.

C.

submit a delta assessment remediation package for C3PAO's internal quality review.

D.

validate that practices previously listed on the POA & M have been removed on an updated Risk Assessment.

Full Access
Question # 19

During a Level 2 Assessment, the OSC has provided an inventory list of all hardware. The list includes servers, workstations, and network devices. Why should this evidence be sufficient for making a scoring determination for AC.L2-3.1.19: Encrypt CUI on mobile devices and mobile computing platforms?

A.

The inventory list does not specify mobile devices.

B.

The interviewee attested to encrypting all data at rest.

C.

The inventory list does not include Bring Your Own Devices.

D.

The DoD has accepted an alternative safeguarding measure for mobile devices.

Full Access
Question # 20

What is the BEST description of the purpose of FAR clause 52 204-21?

A.

It directs all covered contractors to install the cyber security systems listed in that clause.

B.

It describes all of the safeguards that contractors must take to secure covered contractor IS.

C.

It describes the minimum standard of care that contractors must take to secure covered contractor IS.

D.

It directs covered contractors to obtain CMMC Certification at the level equal to the lowest requirement of their contracts.

Full Access
Question # 21

Which government agency are DoD contractors required to report breaches of CUI to?

A.

FBI

B.

NARA

C.

DoD Cyber Crime Center

D.

Under Secretary of Defense for Intelligence and Security

Full Access
Question # 22

Which domains are a part of a Level 1 Self-Assessment?

A.

Access Control (AC), Risk Management < RM), and Media Protection (MP)

B.

Risk Management (RM). Access Control (AC), and Physical Protection (PE)

C.

Access Control (AC), Physical Protection (PE), and Identification and Authentication (IA)

D.

Risk Management (RM). Media Protection (MP), and Identification and Authentication (IA)

Full Access
Question # 23

What is the MOST common purpose of assessment procedures?

A.

Obtain evidence.

B.

Define level of effort.

C.

Determine information flow.

D.

Determine value of hardware and software.

Full Access
Question # 24

During the assessment process, who is the final interpretation authority for recommended findings?

A.

C3PAO

B.

CMMC-AB

C.

OSC sponsor

D.

Assessment Team Members

Full Access
Question # 25

Which regulation allows for whistleblowers to sue on behalf of the federal government?

A.

NISTSP 800-53

B.

NISTSP 800-171

C.

False Claims Act

D.

Code of Professional Conduct

Full Access
Question # 26

A Level 2 Assessment was conducted for an OSC, and the results are ready to be submitted. Prior to uploading the assessment results, what step MUST the C3PAO complete?

A.

Pay an assessment submission fee.

B.

Complete an internal review of the results.

C.

Notify the CMMC-AB that submission is forthcoming.

D.

Coordinate a final briefing between the Lead Assessor and the OSC.

Full Access
Question # 27

Which CMMC Levels meet the standards of protecting FCI (Federal Contract Information) ?

A.

Level 1

B.

Level 2

C.

Levels 2 and 3

D.

Levels 1, 2, and 3

Full Access
Question # 28

When planning an assessment, the Lead Assessor should work with the OSC to select personnel to be interviewed who could:

A.

Have a security clearance

B.

Be a senior person in the company

C.

Demonstrate expertise on the CMMC requirements

D.

Provide clarity and understanding of their practice activities

Full Access
Question # 29

Before submitting the assessment package to the Lead Assessor for final review, a CCP decides to review the Media Protection (MP) Level 1 practice evidence to ensure that all media containing FCI are sanitized or destroyed before disposal or release for reuse. After a thorough review, the CCP tells the Lead Assessor that all supporting documents fully reflect the performance of the practice and should be accepted because the evidence is:

A.

official.

B.

adequate.

C.

compliant.

D.

subjective.

Full Access
Question # 30

While conducting a CMMC Level 2 Assessment, a CCP is reviewing an OSC's personnel security process. They have a policy that describes screening individuals prior to authorizing access to CUI, but it does not mention what organizations should be looking for in an individual. There is no link to a process or procedural document. What should the OSC evaluate when screening individuals prior to accessing CUI?

A.

They are trusted and well liked

B.

They are a hard and loyal worker

C.

Their conduct, integrity, and loyalty

D.

Their functionality, reliability, and ability to adapt

Full Access
Question # 31

A CCP is part of a CMMC Assessment Team interviewing a subject-matter expert on Access Control (AC) within an OSC. During the interview process, what will the CCP ensure about the information exchanged during the interview?

A.

Performed in groups for more efficient use of resources

B.

Recorded for inclusion in the Final Recommended Findings report

C.

Confidential and non-attributable so interviewees can speak without fear of reprisal

D.

Mapped to specific CMMC practices to clearly delineate which practice is being evaluated

Full Access
Question # 32

Which resource could BEST help a CEO determine how to identify the category of CUI ?

A.

NARA

B.

CMMC-AB

C.

DoD DFARS Part 252

D.

CMMC Assessment Guide

Full Access
Question # 33

A Level 2 Assessment of an OSC is winding down and the final results are being prepared to present to the OSC. When should the final results be delivered to the OSC?

A.

At the end of every day of the assessment

B.

Daily and during a final separately scheduled review

C.

Either at the final Daily Checkpoint, or during a separately scheduled findings and recommendation review

D.

Either after approval from the C3PAO. or during a separately scheduled final recommended findings review

Full Access
Question # 34

A Data Access Policy (DAP) document has been provided for review. It outlines the policies, procedures, and requirements for data access within the corporate area and the controlled environment. Which DAP policy statement about visitors is correct?

A.

Visitors must not be escorted.

B.

Visitors must be escorted in the corporate area, but not in the controlled environment.

C.

Visitors must be escorted in the controlled environment, but not in the corporate area.

D.

Visitors must be escorted at all times.

Full Access
Question # 35

SC.L2-3 13.14: Control and monitor the use of VoIP technologies is marked as NOT APPLICABLE for an OSC's assessment. How does this affect the assessment scope?

A.

Any existing telephone system is in scope even if it is not using VoIP technology.

B.

An error has been made and the Lead Assessor should be contacted to correct the error.

C.

VoIP technology is within scope, and it uses FlPS-validated encryption, so it does not need to be assessed.

D.

VoIP technology is not used within scope boundary, so no assessment procedures are specified for this practice.

Full Access
Question # 36

A defense contractor needs to share FCI with a subcontractor and sends this data in an email. The email system involved in this process is being used to:

A.

manage FCI.

B.

process FCI.

C.

transmit FCI.

D.

generate FCI

Full Access
Question # 37

During a CMMC readiness review, the OSC proposes that an associated enclave should not be applicable in the scope. Who is responsible for verifying this request?

A.

CCP

B.

C3PAO

C.

Lead Assessor

D.

Advisory Board

Full Access
Question # 38

A CMMC Assessment is being conducted at an OSC's HQ. which is a shared workspace in a multi-tenant building. The OSC is renting four offices on the first floor that can be locked individually. The first-floor conference room is shared with other tenants but has been reserved to conduct the assessment. The conference room has a desk with a drawer that does not lock. At the end of the day, an evidence file that had been sent by email is reviewed. What is the BEST way to handle this file?

A.

Review it. print it, and put it in the desk drawer.

B.

Review it, and make notes on the computer provided by the client.

C.

Review it, print it, make notes, and then shred it in cross-cut shredder in the print room.

D.

Review it. print it, and leave it in a folder on the table together with the other documents.

Full Access
Question # 39

Which CMMC Levels focus on protecting CUI from exfiltration?

A.

Levels 1 and 2

B.

Levels 1 and 3

C.

Levels 2 and 3

D.

Levels 1, 2, and 3

Full Access
Question # 40

Which training is a CCI authorized to deliver through an approved CMMC LTP?

A.

CMMC-AB approved training

B.

DoD DFARS and CMMC-AB approved training

C.

NARA CUI training and CMMC-AB approved training

D.

DoD DFARS, NARA CUI, and CMMC-AB approved training

Full Access
Question # 41

Contractor scoping requirements for a CMMC Level 2 Assessment to document the asset in an inventory, in the SSP and on the network diagram apply to:

A.

GUI Assets.

B.

CUI and Security Protection Asset categories.

C.

all asset categories except for the Out-of-scope Assets.

D.

Contractor Risk Managed Assets and Specialized Assets.

Full Access
Question # 42

When are data and documents with legacy markings from or for the DoD required to be re-marked or redacted?

A.

When under the control of the DoD

B.

When the document is considered secret

C.

When a document is being shared outside of the organization

D.

When a derivative document's original information is not CUI

Full Access
Question # 43

The Audit and Accountability (AU) domain has practices in:

A.

Level 1.

B.

Level 2.

C.

Levels 1 and 2.

D.

Levels 1 and 3.

Full Access
Question # 44

Companies that knowingly defraud the government by not being in compliance with cybersecurity regulations are at risk of being held liable for:

A.

The contract value plus a penalty as stated in the Cyber Claims Act

B.

The contract value plus a penalty as stated in the False Claims Act

C.

Three times the contract value plus a penalty as stated in the Cyber Claims Act

D.

Three times the contract value plus a penalty as stated in the False Claims Act

Full Access
Question # 45

In accordance with NARA directives and Chapter 33 of Title 44 (Records Management Directive), which types of data MUST have policies and procedures for disposal?

A.

All recorded digital documents

B.

All digital and recorded paper documents

C.

All digital documents and recorded media

D.

All recorded information, regardless of form or characteristics

Full Access
Question # 46

In many organizations, the protection of FCI includes devices that are used to scan physical documentation into digital form and print physical copies of digital FCI. What technical control can be used to limit multi-function device (MFD) access to only the systems authorized to access the MFD?

A.

Virtual LAN restrictions

B.

Single administrative account

C.

Documentation showing MFD configuration

D.

Access lists only known to the IT administrator

Full Access
Question # 47

At which CMMC Level do the Security Assessment (CA) practices begin?

A.

Level 1

B.

Level 2

C.

Level 3

D.

Level 4

Full Access
Question # 48

The results package for a Level 2 Assessment is being submitted. What MUST a Final Report. CMMC Assessment Results include?

A.

Affirmation for each practice or control

B.

Documented rationale for each failed practice

C.

Suggested improvements for each failed practice

D.

Gaps or deltas due to any reciprocity model are recorded as met

Full Access
Question # 49

Which document is the BEST source for descriptions of each practice or process contained within the various CMMC domains?

A.

CMMC Glossary

B.

CMMC Appendices

C.

CMMC Assessment Process

D.

CMMC Assessment Guide Levels 1 and 2

Full Access
Question # 50

OSCs MUST provide documentation that vulnerability scans are performed:

A.

at an OSC-defined frequency and when new vulnerabilities are identified.

B.

as defined by an accredited RPO.

C.

every time a penetration test is performed.

D.

on an ad hoc basis or as directed by the security manager.

Full Access
Question # 51

A CMMC Level 1 Self-Assessment identified an asset in the OSC's facility that does not process, store, or transmit FCI. Which type of asset is this considered?

A.

FCI Assets

B.

Specialized Assets

C.

Out-of-Scope Assets

D.

Government-Issued Assets

Full Access
Question # 52

How are the Final Recommended Assessment Findings BEST presented?

A.

Using the CMMC Findings Brief template

B.

Using a C3PAO-provided template that is preferred by the OSC

C.

Using a C3PAO-branded version of the CMMC Findings Brief template

D.

Using the proprietary template created by the Lead Assessor after approval from the C3PAO

Full Access
Question # 53

An OSC has submitted evidence for an upcoming assessment. The assessor reviews the evidence and determines it is not adequate or sufficient to meet the CMMC practice. What can the assessor do?

A.

Notify the CMMC-AB.

B.

Cancel the assessment.

C.

Postpone the assessment.

D.

Contact the C3PAO for guidance.

Full Access
Question # 54

An Assessment Team is conducting a Level 2 Assessment at the request of an OSC. The team has begun to score practices based on the evidence provided. At a MINIMUM what is required of the Assessment Team to determine if a practice is scored as MET?

A.

All three types of evidence are documented for every control.

B.

Examine and accept evidence from one of the three evidence types.

C.

Complete one of the following; examine two artifacts, either observe a satisfactory demonstration of one control or receive one affirmation from the OSC personnel.

D.

Complete two of the following: examine one artifact, either observe a satisfactory demonstration of one control or receive one affirmation from the OSC personnel.

Full Access
Question # 55

For a CMMC Level 2 certification, which organization maintains a non-disclosure agreement with the OSC?

A.

NIST

B.

C3PAO

C.

CMMC-AB

D.

OUSD A & S

Full Access
Question # 56

Per DoDI 5200.48: Controlled Unclassified Information (CUI), CUI is marked by whom?

A.

DoD OUSD

B.

Authorized holder

C.

Information Disclosure Official

D.

Presidential authorized Original Classification Authority

Full Access
Question # 57

An organization that manufactures night vision cameras is looking for help to address the gaps identified in physical access control systems. Which certified individual should they approach for implementation support?

A.

CCA of the C3PAO performing the assessment

B.

RP of an organization not part of the assessment

C.

Practitioner of the organization performing the assessment LTP

D.

DoD Contract Official of the organization performing the assessment

Full Access
Question # 58

A C3PAO has completed a Limited Practice Deficiency Correction Evaluation following an assessment of an OSC. The Lead Assessor has recommended moving deficiencies to a POA & M. but the OSC will remain on an Interim Certification. What is the MINIMUM number of practices that must be scored as MET to initiate this course of action?

A.

80 practices

B.

88 practices

C.

100 practices

D.

110 practices

Full Access
Question # 59

Evidence gathered from an OSC is being reviewed. Based on the assessment and organizational scope, the Lead Assessor requests the Assessment Team to verify that the coverage by domain, practice. Host Unit. Supporting Organization/Unit, and enclaves are comprehensive enough to rate against each practice. Which criteria is the assessor referring to?

A.

Adequacy

B.

Capability

C.

Sufficiency

D.

Objectivity

Full Access
Question # 60

In the CMMC Model, how many practices are included in Level 2?

A.

17 practices

B.

72 practices

C.

110 practices

D.

180 practices

Full Access
Question # 61

Which document is the BEST source for determining the sources of evidence for a given practice?

A.

NISTSP 800-53

B.

NISTSP 800-53A

C.

CMMC Assessment Scope

D.

CMMC Assessment Guide

Full Access
Question # 62

An OSC needs to be assessed on RA.L2-3.11.1: Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI. What is in scope for a Level 2 assessment of RA.L2-3.11.1?

A.

IT systems

B.

Enterprise systems

C.

CUI Marking processes

D.

Processes, people, physical entities, and IT systems in which CUI processed, stored, or transmitted

Full Access
Question # 63

The director of cybersecurity is considering which company offices and data centers store FCI to ensure an accurate scope for their CMMC Level 1 Self-Assessment . Which asset type is the director considering?

A.

ESP

B.

People

C.

Facilities

D.

Technology

Full Access
Question # 64

A CCP is working as an Assessment Team Member on a CMMC Level 2 Assessment. The Lead Assessor has assigned the CCP to assess the OSC's Configuration Management (CM) domain. The CCP's first interview is with a subject-matter expert for user-installed software. With respect to user-installed software, what facet should the CCP's interview focus on?

A.

Controlled and monitored

B.

Removed from the system

C.

Scanned for malicious code

D.

Limited to mission-essential use only

Full Access
Question # 65

A machining company has been awarded a contract with the DoD to build specialized parts. Testing of the parts will be done by the company using in-house staff and equipment. For a Level 1 Self-Assessment, what type of asset is this?

A.

CUI Asset

B.

In-scope Asset

C.

Specialized Asset

D.

Contractor Risk Managed Asset

Full Access
Question # 66

Who makes the final determination of the assessment method used for each practice?

A.

CCP

B.

osc

C.

Site Manager

D.

Lead Assessor

Full Access
Question # 67

CMMC scoping covers the CUI environment encompassing the systems, applications, and services that focus on where CUI is:

A.

received and transferred.

B.

stored, processed, and transmitted.

C.

entered, edited, manipulated, printed, and viewed.

D.

located on electronic media, on system component memory, and on paper.

Full Access
Question # 68

Which statement BEST describes the requirements for a C3PA0?

A.

An authorized C3PAO must meet some DoD and all ISO/IEC 17020 requirements.

B.

An accredited C3PAO must meet all DoD and some ISO/IEC 17020 requirements.

C.

AC3PAO must be accredited by DoD before being able to conduct assessments.

D.

A C3PAO must be authorized by CMMC-AB before being able to conduct assessments.

Full Access