Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Cyber AB > CMMC > CMMC-CCP

CMMC-CCP Certified CMMC Professional (CCP) Exam Question and Answers

Question # 4

What is objectivity as it applies to activities with the CMMC-AB?

A.

Ensuring full disclosure

B.

Reporting results of CMMC services completely

C.

Avoiding the appearance of or actual, conflicts of interest

D.

Demonstrating integrity in the use of materials as described in policy

Full Access
Question # 5

An assessor needs to get the most accurate answers from an OSC's team members. What is the BEST method to ensure that the OSC's team members are able to describe team member responsibilities?

A.

Interview groups of people to get collective answers.

B.

Understand that testing is more important that interviews.

C.

Ensure confidentiality and non-attribution of team members.

D.

Let team members know the questions prior to the assessment.

Full Access
Question # 6

Which assessment method compares actual-specified conditions with expected behavior?

A.

Test

B.

Examine

C.

Compile

D.

Interview

Full Access
Question # 7

What is the BEST description of the purpose of FAR clause 52 204-21?

A.

It directs all covered contractors to install the cyber security systems listed in that clause.

B.

It describes all of the safeguards that contractors must take to secure covered contractor IS.

C.

It describes the minimum standard of care that contractors must take to secure covered contractor IS.

D.

It directs covered contractors to obtain CMMC Certification at the level equal to the lowest requirement of their contracts.

Full Access
Question # 8

During a Level 1 Self-Assessment, a smart thermostat was identified. It is connected to the Internet on the OSC's WiFi network. What type of asset is this?

A.

FCI Asset

B.

CUI Asset

C.

In-scope Asset

D.

Specialized Asset

Full Access
Question # 9

A cyber incident is discovered that affects a covered contractor IS and the CDI residing therein. How long does the contractor have to inform the DoD?

A.

24 hours

B.

48 hours

C.

72 hours

D.

96 hours

Full Access
Question # 10

In accordance with NARA directives and Chapter 33 of Title 44 (Records Management Directive), which types of data MUST have policies and procedures for disposal?

A.

All recorded digital documents

B.

All digital and recorded paper documents

C.

All digital documents and recorded media

D.

All recorded information, regardless of form or characteristics

Full Access
Question # 11

The Assessment Team has completed the assessment and determined the preliminary practice ratings. The preliminary practice ratings must be shared with the OSC prior to being finalized for submission. Based on this information, the assessor should present the preliminary practice ratings:

A.

During the final Daily Checkpoint

B.

After discussing with the CMMC-AB

C.

Via email after the final Daily Checkpoint

D.

Over the phone after the final Daily Checkpoint

Full Access
Question # 12

A CCP is part of a CMMC Assessment Team interviewing a subject-matter expert on Access Control (AC) within an OSC. During the interview process, what will the CCP ensure about the information exchanged during the interview?

A.

Performed in groups for more efficient use of resources

B.

Recorded for inclusion in the Final Recommended Findings report

C.

Confidential and non-attributable so interviewees can speak without fear of reprisal

D.

Mapped to specific CMMC practices to clearly delineate which practice is being evaluated

Full Access
Question # 13

How are the Final Recommended Assessment Findings BEST presented?

A.

Using the CMMC Findings Brief template

B.

Using a C3PAO-provided template that is preferred by the OSC

C.

Using a C3PAO-branded version of the CMMC Findings Brief template

D.

Using the proprietary template created by the Lead Assessor after approval from the C3PAO

Full Access
Question # 14

The Audit and Accountability (AU) domain has practices in:

A.

Level 1.

B.

Level 2.

C.

Levels 1 and 2.

D.

Levels 1 and 3.

Full Access
Question # 15

In the CMMC Model, how many practices are included in Level 2?

A.

17 practices

B.

72 practices

C.

110 practices

D.

180 practices

Full Access
Question # 16

An OSC has requested a C3PAO to conduct a Level 2 Assessment. The C3PAO has agreed, and the two organizations have collaborated to develop the Assessment Plan. Who agrees to and signs off on the Assessment Plan?

A.

OSC and Sponsor

B.

OSC and CMMC-AB

C.

Lead Assessor and C3PAO

D.

C3PAO and Assessment Official

Full Access
Question # 17

What is the MINIMUM required marking for a document containing CUI?

A.

"CUI" must be placed in the header and footer of the document

B.

"WCUI" must be placed in the header and footer of the document

C.

Portion marks must be placed on all sections, parts, paragraphs, etc. known to contain CUI

D.

A cover page must be placed to obscure content with the acronym "CUI" prominently placed

Full Access
Question # 18

Which words summarize categories of data disposal described in the NIST SP 800-88 Revision 1. Guidelines for Media Sanitation?

A.

Clear, purge, destroy

B.

Clear redact, destroy

C.

Clear, overwrite, purge

D.

Clear, overwrite, destroy

Full Access
Question # 19

In late September. CA.L2-3.12.1: Periodically assess the security controls in organizational systems to determine if the controls are effective in their application is assessed. Procedure specifies that a security control assessment shall be conducted quarterly. The Lead Assessor is only provided the first quarter assessment report because the person conducting the second quarter's assessment is currently out of the office and will return to the office in two hours. Based on this information, the Lead Assessor should determine that the evidence is;

A.

sufficient, and rate the audit finding as MET

B.

insufficient, and rate the audit finding as NOT MET.

C.

sufficient, and re-rate the audit finding after a quarter two assessment report is examined.

D.

insufficient, and re-rate the audit finding after a quarter two assessment report is examined.

Full Access
Question # 20

A Lead Assessor has been assigned to a CMMC Assessment During the assessment, one of the assessors approaches with a signed policy. There is one signatory, and that person has since left the company. Subsequently, another person was hired into that position but has not signed the document. Is this document valid?

A.

The signatory is the authority to implement and enforce the policy, and since that person is no longer with the company, the policy is not valid.

B.

More research on the company policy of creating, implementing, and enforcing policies is needed. If the company has a policy identifying the authority as with the position or person, then the policy is valid.

C.

The signatory does not validate or invalidate the policy. For the purpose of this assessment, ensuring that the policy is current and is being implemented by the individuals who are performing the work is sufficient.

D.

The authority to implement and enforce lies with the position, not the person. As long as that position's authority and responsibilities have not been removed from implementing that domain, it is still a valid policy.

Full Access
Question # 21

An assessment procedure consists of an assessment objective, potential assessment methods, and assessment objects. Which statement is part of an assessment objective?

A.

Specifications and mechanisms

B.

Examination, interviews, and testing

C.

Determination statement related to the practice

D.

Exercising assessment objects under specified conditions

Full Access
Question # 22

When planning an assessment, the Lead Assessor should work with the OSC to select personnel to be interviewed who could:

A.

Have a security clearance

B.

Be a senior person in the company

C.

Demonstrate expertise on the CMMC requirements

D.

Provide clarity and understanding of their practice activities

Full Access
Question # 23

In many organizations, the protection of FCI includes devices that are used to scan physical documentation into digital form and print physical copies of digital FCI. What technical control can be used to limit multi-function device (MFD) access to only the systems authorized to access the MFD?

A.

Virtual LAN restrictions

B.

Single administrative account

C.

Documentation showing MFD configuration

D.

Access lists only known to the IT administrator

Full Access
Question # 24

An Assessment Team is conducting interviews with team members about their roles and responsibilities. The team member responsible for maintaining the antivirus program knows that it was deployed but has very little knowledge on how it works. Is this adequate for the practice?

A.

Yes, the antivirus program is available, so it is sufficient.

B.

Yes, antivirus programs are automated to run independently.

C.

No, the team member must know how the antivirus program is deployed and maintained.

D.

No, the team member's interview answers about deployment and maintenance are insufficient.

Full Access
Question # 25

A Lead Assessor is preparing to conduct a Readiness Review during Phase 1 of the Assessment Process. How much evidence MUST be gathered for each practice?

A.

A sufficient amount

B.

At least 2 Assessment Objects

C.

Evidence that is deemed adequate

D.

Evidence to support at least 2 Assessment Methods

Full Access
Question # 26

Which term describes "the protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to. or modification of information"?

A.

Adopted security

B.

Adaptive security

C.

Adequate security

D.

Advanced security

Full Access
Question # 27

An OSC has submitted evidence for an upcoming assessment. The assessor reviews the evidence and determines it is not adequate or sufficient to meet the CMMC practice. What can the assessor do?

A.

Notify the CMMC-AB.

B.

Cancel the assessment.

C.

Postpone the assessment.

D.

Contact the C3PAO for guidance.

Full Access
Question # 28

Which statement is NOT a measure to determine if collected evidence is sufficient?

A.

Evidence covers the sampled organization

B.

Evidence is not required if the practice is ISO certified

C.

Evidence covers the model scope of the Assessment (Target CMMC Level)

D.

Evidence corresponds to the sampled organization in the evidence collection approach

Full Access
Question # 29

A contractor provides services and data to the DoD. The transactions that occur to handle FCI take place over the contractor's business network, but the work is performed on contractor-owned systems, which must be configured based on government requirements and are used to support a contract. What type of Specialized Asset are these systems?

A.

loT

B.

Restricted IS

C.

Test equipment

D.

Government property

Full Access
Question # 30

In CMMC High-Level scoping, which definition BEST describes an HQ organization?

A.

The entity that carries out the tasks under a contract

B.

The unit to which a CMMC Level is applied for each contract

C.

The teams, services, and technologies that provide support to a Host Unit

D.

The entity legally responsible for the delivery of products or services under a contract

Full Access
Question # 31

Before submitting the assessment package to the Lead Assessor for final review, a CCP decides to review the Media Protection (MP) Level 1 practice evidence to ensure that all media containing FCI are sanitized or destroyed before disposal or release for reuse. After a thorough review, the CCP tells the Lead Assessor that all supporting documents fully reflect the performance of the practice and should be accepted because the evidence is:

A.

official.

B.

adequate.

C.

compliant.

D.

subjective.

Full Access
Question # 32

In scoping a CMMC Level 1 Self-Assessment, all of the computers and digital assets that handle FCI are identified. A file cabinet that contains paper FCI is also identified. What can this file cabinet BEST be determined to be?

A.

In scope, because it is an asset that stores FCI

B.

In scope, because it is part of the same physical location

C.

Out of scope, because they are all only paper documents

D.

Out of scope, because it does not process or transmit FCI

Full Access
Question # 33

A dedicated local printer is used to print out documents with FCI in an organization. This is considered an FCI Asset Which function BEST describes what the printer does with the FCI?

A.

Encrypt

B.

Manage

C.

Process

D.

Distribute

Full Access
Question # 34

Companies that knowingly defraud the government by not being in compliance with cybersecurity regulations are at risk of being held liable for:

A.

The contract value plus a penalty as stated in the Cyber Claims Act

B.

The contract value plus a penalty as stated in the False Claims Act

C.

Three times the contract value plus a penalty as stated in the Cyber Claims Act

D.

Three times the contract value plus a penalty as stated in the False Claims Act

Full Access
Question # 35

A server is used to store FCI with a cloud provider long-term. What is the server considered?

A.

In scope, because the cloud provider will be storing the FCI data

B.

Out of scope, because the cloud provider stores the FCI data long-term

C.

In scope, because the cloud provider is required to be CMMC Level 2 certified

D.

Out of scope, because encryption is always used when the cloud provider stores the FCI data

Full Access
Question # 36

Ethics is a shared responsibility between:

A.

DoD and CMMC-AB.

B.

OSC and sponsors.

C.

CMMC-AB and members of the CMMC Ecosystem.

D.

members of the CMMC Ecosystem and Lead Assessors.

Full Access
Question # 37

Which CMMC Levels focus on protecting CUI from exfiltration?

A.

Levels 1 and 2

B.

Levels 1 and 3

C.

Levels 2 and 3

D.

Levels 1, 2, and 3

Full Access
Question # 38

Which method facilitates understanding by analyzing gathered artifacts as evidence?

A.

Test

B.

Examine

C.

Behavior

D.

Interview

Full Access
Question # 39

While conducting a CMMC Level 2 Assessment, the Lead Assessor determines that the OSC has badge readers, pin code pads, and keys for various access points as well as documentation to demonstrate meeting the practice. Which CMMC practice has the OSC MET?

A.

PE.L1-3.10.5: Control and manage physical access devices

B.

MP.L2-3.8.5: Mark media with necessary CUI markings and distribution limitations

C.

SI.L2-3.14.3: Monitor system security alerts and advisories and take action in response

D.

PS.L2-3.9.2: Ensure that organizational systems containing CUI are protected during and after personnel actions such as terminations and transfers

Full Access
Question # 40

When planning an assessment, the Lead Assessor should work with the OSC to select personnel to be interviewed who could:

A.

have a security clearance.

B.

be a senior person in the company.

C.

demonstrate expertise on the CMMC requirements.

D.

provide clarity and understanding of their practice activities.

Full Access
Question # 41

During a CMMC readiness review, the OSC proposes that an associated enclave should not be applicable in the scope. Who is responsible for verifying this request?

A.

CCP

B.

C3PAO

C.

Lead Assessor

D.

Advisory Board

Full Access
Question # 42

During assessment planning, the OSC recommends a person to interview for a certain practice. The person being interviewed MUST be the person who:

A.

funds that practice.

B.

audits that practice.

C.

supports, audits, and performs that practice.

D.

implements, performs, or supports that practice.

Full Access
Question # 43

Which entity requires that organizations handling FCI or CUI be assessed to determine a required Level of cybersecurity maturity?

A.

DoD

B.

CISA

C.

NIST

D.

CMMC-AB

Full Access
Question # 44

A Lead Assessor is performing a CMMC readiness review. The Lead Assessor has already recorded the assessment risk status and the overall assessment feasibility. At MINIMUM, what remaining readiness review criteria should be verified?

A.

Determine the practice pass/fail results.

B.

Determine the preliminary recommended findings.

C.

Determine the initial model practice ratings and record them.

D.

Determine the logistics. Assessment Team, and the evidence readiness.

Full Access
Question # 45

What type of information is NOT intended for public release and is provided by or generated for the government under a contract to develop or deliver a product or service to the government, but not including information provided by the government to the public (such as on public websites) or simple transactional information, such as necessary to process payments?

A.

CDI

B.

CTI

C.

CUI

D.

FCI

Full Access
Question # 46

What are CUI protection responsibilities?

A.

Shielding

B.

Governing

C.

Correcting

D.

Safeguarding

Full Access
Question # 47

A C3PAO is conducting High Level Scoping for an OSC that requested an assessment Which term describes the people, processes, and technology that will be applied to the contract who are requesting a CMMC Level assessment?

A.

Host Unit

B.

Branch Office

C.

Coordinating Unit

D.

Supporting Organization/Units

Full Access
Question # 48

Where can a listing of all federal agencies' CUI indices and categories be found?

A.

32 CFR Section 2002

B.

Official CUI Registry

C.

Executive Order 13556

D.

Official CMMC Registry

Full Access
Question # 49

The Level 1 practice description in CMMC is Foundational. What is the Level 2 practice description?

A.

Expert

B.

Advanced

C.

Optimizing

D.

Continuously Improved

Full Access
Question # 50

Which domain has a practice requiring an organization to restrict, disable, or prevent the use of nonessential programs?

A.

Access Control (AC)

B.

Media Protection (MP)

C.

Asset Management (AM)

D.

Configuration Management (CM)

Full Access
Question # 51

During Phase 4 of the Assessment process, what MUST the Lead Assessor determine and recommend to the C3PAO concerning the OSC?

A.

Ability

B.

Eligibility

C.

Capability

D.

Suitability

Full Access
Question # 52

During the planning phase of a CMMC Level 2 Assessment, the Lead Assessor is considering what would constitute the right evidence for each practice. What is the Assessor attempting to verify?

A.

Adequacy

B.

Sufficiency

C.

Process mapping

D.

Assessment scope

Full Access
Question # 53

A test or demonstration is being performed for the Assessment Team during an assessment. Which environment MUST the OSC perform this test or demonstration?

A.

Client

B.

Production

C.

Development

D.

Demonstration

Full Access
Question # 54

Which term describes the process of granting or denying specific requests to obtain and use information, related information processing services, and enter specific physical facilities?

A.

Access control

B.

Physical access control

C.

Mandatory access control

D.

Discretionary access control

Full Access
Question # 55

While conducting a CMMC Level 2 Assessment, a CCP is reviewing an OSC's personnel security process. They have a policy that describes screening individuals prior to authorizing access to CUI, but it does not mention what organizations should be looking for in an individual. There is no link to a process or procedural document. What should the OSC evaluate when screening individuals prior to accessing CUI?

A.

They are trusted and well liked

B.

They are a hard and loyal worker

C.

Their conduct, integrity, and loyalty

D.

Their functionality, reliability, and ability to adapt

Full Access
Question # 56

Who makes the final determination of the assessment method used for each practice?

A.

CCP

B.

osc

C.

Site Manager

D.

Lead Assessor

Full Access
Question # 57

Which are guiding principles in the CMMC Code of Professional Conduct?

A.

Objectivity, information integrity, and higher accountability

B.

Objectivity, information integrity, and proper use of methods

C.

Proper use of methods, higher accountability, and objectivity

D.

Proper use of methods, higher accountability, and information integrity

Full Access
Question # 58

The practices in CMMC Level 2 consists of the security requirements specified in:

A.

NISTSP 800-53.

B.

NISTSP 800-171.

C.

48 CFR 52.204-21.

D.

DFARS 252.204-7012.

Full Access
Question # 59

Who will verify the adequacy and sufficiency of evidence to determine whether the practices and related components for each in-scope Host Unit. Supporting Organization/Unit, or enclave has been met?

A.

OSC

B.

Assessment Team

C.

Authorizing official

D.

Assessment official

Full Access
Question # 60

An assessment is being conducted at a remote client site. For the duration of the assessment, the client has provided a designated hoteling space in their secure facility which consists of a desk with access to a shared printer. After noticing that the desk does not lock, a locked cabinet is requested but the client does not have one available. At the end of the day, the client provides a printout copy of an important network diagram. The diagram is clearly marked and contains CUI. What should be done NEXT to protect the document?

A.

Take it with them to review in the evening.

B.

Leave it on the desk for review the following day.

C.

Put it in the unlocked desk drawer for review the following morning.

D.

Take a picture with the personal phone before securely shredding it.

Full Access
Question # 61

Which assessment method describes the process of reviewing, inspecting, observing, studying, or analyzing assessment objects (i.e., specification, mechanisms, activities)?

A.

Test

B.

Assess

C.

Examine

D.

Interview

Full Access