Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cyber AB > CMMC > CMMC-CCP

CMMC-CCP Certified CMMC Professional (CCP) Exam Question and Answers

Question # 4

A contractor stores security policies, system configuration files, and audit logs in a centralized file repository for later review. According to CMMC terminology, the file repository is being used to:

A.

protect CUI.

B.

transmit CUI.

C.

store CUI.

D.

generate CUI

Full Access
Question # 5

Per DoDI 5200.48: Controlled Unclassified Information (CUI), CUI is marked by whom?

A.

DOD OUSD

B.

Authorized holder

C.

Information Disclosure Official

D.

Presidentially authorized Original Classification Authority

Full Access
Question # 6

An assessor needs to get the most accurate answers from an OSC's team members. What is the BEST method to ensure that the OSC's team members are able to describe team member responsibilities?

A.

Interview groups of people to get collective answers.

B.

Understand that testing is more important that interviews.

C.

Ensure confidentiality and non-attribution of team members.

D.

Let team members know the questions prior to the assessment.

Full Access
Question # 7

When planning an assessment, the Lead Assessor should work with the OSC to select personnel to be interviewed who could:

A.

have a security clearance.

B.

be a senior person in the company.

C.

demonstrate expertise on the CMMC requirements.

D.

provide clarity and understanding of their practice activities.

Full Access
Question # 8

A cyber incident is discovered that affects a covered contractor IS and the CDI residing therein. How long does the contractor have to inform the DoD?

A.

24 hours

B.

48 hours

C.

72 hours

D.

96 hours

Full Access
Question # 9

The practices in CMMC Level 2 consists of the security requirements specified in:

A.

NISTSP 800-53.

B.

NISTSP 800-171.

C.

48 CFR 52.204-21.

D.

DFARS 252.204-7012.

Full Access
Question # 10

Which words summarize categories of data disposal described in the NIST SP 800-88 Revision 1. Guidelines for Media Sanitation?

A.

Clear, purge, destroy

B.

Clear redact, destroy

C.

Clear, overwrite, purge

D.

Clear, overwrite, destroy

Full Access
Question # 11

Which term describes the prevention of damage to. protection of, and restoration of computers and electronic communications systems/services, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation?

A.

Cybersecurity

B.

Data security

C.

Network security

D.

Information security

Full Access
Question # 12

Within how many days from the Assessment Final Recommended Findings Brief should the Lead Assessor and Assessment Team Members, if necessary, review the accuracy and validity of (he OSC's updated POA & M with any accompanying evidence or scheduled collections?

A.

90 days

B.

180 days

C.

270 days

D.

360 days

Full Access
Question # 13

SC.L2-3 13.14: Control and monitor the use of VoIP technologies is marked as NOT APPLICABLE for an OSC's assessment. How does this affect the assessment scope?

A.

Any existing telephone system is in scope even if it is not using VoIP technology.

B.

An error has been made and the Lead Assessor should be contacted to correct the error.

C.

VoIP technology is within scope, and it uses FlPS-validated encryption, so it does not need to be assessed.

D.

VoIP technology is not used within scope boundary, so no assessment procedures are specified for this practice.

Full Access
Question # 14

In scoping a CMMC Level 1 Self-Assessment, all of the computers and digital assets that handle FCI are identified. A file cabinet that contains paper FCI is also identified. What can this file cabinet BEST be determined to be?

A.

In scope, because it is an asset that stores FCI

B.

In scope, because it is part of the same physical location

C.

Out of scope, because they are all only paper documents

D.

Out of scope, because it does not process or transmit FCI

Full Access
Question # 15

Which training is a CCI authorized to deliver through an approved CMMC LTP?

A.

CMMC-AB approved training

B.

DoD DFARS and CMMC-AB approved training

C.

NARA CUI training and CMMC-AB approved training

D.

DoD DFARS, NARA CUI, and CMMC-AB approved training

Full Access
Question # 16

An Assessment Team Member is conducting a CMMC Level 2 Assessment for an OSC that is in the process of inspecting Assessment Objects for AC.L1-3.1.1: Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems) to determine the adequacy of evidence provided by the OSC. Which Assessment Method does this activity fall under?

A.

Test

B.

Observe

C.

Examine

D.

Interview

Full Access
Question # 17

Which term describes the process of granting or denying specific requests to obtain and use information, related information processing services, and enter specific physical facilities?

A.

Access control

B.

Physical access control

C.

Mandatory access control

D.

Discretionary access control

Full Access
Question # 18

CMMC scoping covers the CUI environment encompassing the systems, applications, and services that focus on where CUI is:

A.

received and transferred.

B.

stored, processed, and transmitted.

C.

entered, edited, manipulated, printed, and viewed.

D.

located on electronic media, on system component memory, and on paper.

Full Access
Question # 19

A Level 2 Assessment of an OSC is winding down and the final results are being prepared to present to the OSC. When should the final results be delivered to the OSC?

A.

At the end of every day of the assessment

B.

Daily and during a final separately scheduled review

C.

Either at the final Daily Checkpoint, or during a separately scheduled findings and recommendation review

D.

Either after approval from the C3PAO. or during a separately scheduled final recommended findings review

Full Access
Question # 20

An OSC performing a CMMC Level 1 Self-Assessment uses a legacy Windows 95 computer, which is the only system that can run software that the government contract requires. Why can this asset be considered out of scope?

A.

It handles CUI

B.

It is a restricted IS

C.

It is government property

D.

It is operational technology

Full Access
Question # 21

How does the CMMC define a practice?

A.

A business transaction

B.

A condition arrived at by experience or exercise

C.

A series of changes taking place in a defined manner

D.

An activity or activities performed to meet defined CMMC objectives

Full Access
Question # 22

The director of sales, in a meeting, stated that the sales team received feedback on some emails that were sent, stating that the emails were not marked correctly. Which training should the director of sales refer the sales team to regarding information as to how to mark emails?

A.

FBI CUI Introduction to Marking

B.

NARA CUI Introduction to Marking

C.

C3PAO CUI Introduction to Marking

D.

CMMC-AB CUI Introduction to Marking

Full Access
Question # 23

A contractor provides services and data to the DoD. The transactions that occur to handle FCI take place over the contractor's business network, but the work is performed on contractor-owned systems, which must be configured based on government requirements and are used to support a contract. What type of Specialized Asset are these systems?

A.

loT

B.

Restricted IS

C.

Test equipment

D.

Government property

Full Access
Question # 24

Which resource could BEST help a CEO determine how to identify the category of CUI ?

A.

NARA

B.

CMMC-AB

C.

DoD DFARS Part 252

D.

CMMC Assessment Guide

Full Access
Question # 25

A CMMC Assessment is being conducted at an OSC's HQ. which is a shared workspace in a multi-tenant building. The OSC is renting four offices on the first floor that can be locked individually. The first-floor conference room is shared with other tenants but has been reserved to conduct the assessment. The conference room has a desk with a drawer that does not lock. At the end of the day, an evidence file that had been sent by email is reviewed. What is the BEST way to handle this file?

A.

Review it. print it, and put it in the desk drawer.

B.

Review it, and make notes on the computer provided by the client.

C.

Review it, print it, make notes, and then shred it in cross-cut shredder in the print room.

D.

Review it. print it, and leave it in a folder on the table together with the other documents.

Full Access
Question # 26

What type of information is NOT intended for public release and is provided by or generated for the government under a contract to develop or deliver a product or service to the government, but not including information provided by the government to the public (such as on public websites) or simple transactional information, such as necessary to process payments?

A.

CDI

B.

CTI

C.

CUI

D.

FCI

Full Access
Question # 27

An assessment is being conducted at a remote client site. For the duration of the assessment, the client has provided a designated hoteling space in their secure facility which consists of a desk with access to a shared printer. After noticing that the desk does not lock, a locked cabinet is requested but the client does not have one available. At the end of the day, the client provides a printout copy of an important network diagram. The diagram is clearly marked and contains CUI. What should be done NEXT to protect the document?

A.

Take it with them to review in the evening.

B.

Leave it on the desk for review the following day.

C.

Put it in the unlocked desk drawer for review the following morning.

D.

Take a picture with the personal phone before securely shredding it.

Full Access
Question # 28

During the planning phase of the Assessment Process. C3PAO staff are reviewing the various entities associated with an OSC that has requested a CMMC Level 2 Assessment. Which term describes the people, processes, and technology external to the HQ Organization that participate in the assessment but will not receive a CMMC Level unless an enterprise Assessment is conducted?

A.

Host Unit

B.

Organization

C.

Coordinating Unit

D.

Supporting Organization/Unit

Full Access
Question # 29

What service is the MOST comprehensive that the RPO provides?

A.

Training services

B.

Education services

C.

Consulting services

D.

Assessment services

Full Access
Question # 30

The evidence needed for each practice and/or process is weight for:

A.

adequacy and sufficiency.

B.

adequacy and thoroughness.

C.

sufficiency and thoroughness.

D.

sufficiency and appropriateness.

Full Access
Question # 31

While developing an assessment plan for an OSC. it is discovered that the certified assessor will be interviewing a former college roommate. What is the MOST correct action to take?

A.

Do not inform the OSC and the C3PAO of the possible conflict of interest, and continue as planned.

B.

Inform the OSC and the C3PAO of the possible conflict of interest, and start the entire process over without the conflicted team member.

C.

Inform the OSC and the C3PAO of the possible conflict of interest but since it has been an acceptable amount of time since college, no conflict of interest exists, and continue as planned.

D.

Inform the OSC and the C3PAO of the possible conflict of interest, document the conflict and mitigation actions in the assessment plan, and if the mitigation actions are acceptable, continue with the assessment.

Full Access
Question # 32

The results package for a Level 2 Assessment is being submitted. What MUST a Final Report. CMMC Assessment Results include?

A.

Affirmation for each practice or control

B.

Documented rationale for each failed practice

C.

Suggested improvements for each failed practice

D.

Gaps or deltas due to any reciprocity model are recorded as met

Full Access
Question # 33

Before submitting the assessment package to the Lead Assessor for final review, a CCP decides to review the Media Protection (MP) Level 1 practice evidence to ensure that all media containing FCI are sanitized or destroyed before disposal or release for reuse. After a thorough review, the CCP tells the Lead Assessor that all supporting documents fully reflect the performance of the practice and should be accepted because the evidence is:

A.

official.

B.

adequate.

C.

compliant.

D.

subjective.

Full Access
Question # 34

When assessing SI.L2-3.14.6: Monitor communications for attack, the CCA interviews the person responsible for the intrusion detection system and examines relevant policies and procedures for monitoring organizational systems. What would be a possible next step the CCA could conduct to gather sufficient evidence?

A.

Conduct a penetration test

B.

Interview the intrusion detection system's supplier.

C.

Upload known malicious code and observe the system response.

D.

Review an artifact to check key references for the configuration of the IDS or IPS practice for additional guidance on intrusion detection and prevention systems.

Full Access
Question # 35

When planning an assessment, the Lead Assessor should work with the OSC to select personnel to be interviewed who could:

A.

Have a security clearance

B.

Be a senior person in the company

C.

Demonstrate expertise on the CMMC requirements

D.

Provide clarity and understanding of their practice activities

Full Access
Question # 36

At which CMMC Level do the Security Assessment (CA) practices begin?

A.

Level 1

B.

Level 2

C.

Level 3

D.

Level 4

Full Access
Question # 37

Which principles are included in defining the CMMC-AB Code of Professional Conduct?

A.

Objectivity, classification, and information accuracy

B.

Objectivity, confidentiality, and information integrity

C.

Responsibility, classification, and information accuracy

D.

Responsibility, confidentiality, and information integrity

Full Access
Question # 38

Recording evidence as adequate is defined as the criteria needed to:

A.

verify, based on an assessment and organizational scope.

B.

verify, based on an assessment and organizational practice.

C.

determine if a given artifact, interview response, demonstration, or test meets the CMMC scope.

D.

determine if a given artifact, interview response, demonstration, or test meets the CMMC practice.

Full Access
Question # 39

When executing a remediation review, the Lead Assessor should:

A.

help OSC to complete planned remediation activities.

B.

plan two consecutive remediation reviews for an OSC.

C.

submit a delta assessment remediation package for C3PAO's internal quality review.

D.

validate that practices previously listed on the POA & M have been removed on an updated Risk Assessment.

Full Access
Question # 40

In performing scoping, what should the assessor ensure that the scope of the assessment covers?

A.

All assets documented in the business plan

B.

All assets regardless if they do or do not process, store, or transmit FCI/CUI

C.

All entities, regardless of the line of business, associated with the organization

D.

All assets processing, storing, or transmitting FCI/CUI and security protection assets

Full Access
Question # 41

Which code or clause requires that a contractor is meeting the basic safeguarding requirements for FCI during a Level 1 Self-Assessment?

A.

FAR 52.204-21

B.

22CFR 120-130

C.

DFARS 252.204-7011

D.

DFARS 252.204-7021

Full Access
Question # 42

An assessor is collecting affirmations. So far, the assessor has collected interviews, demonstrations, emails, messaging, and presentations. Are these appropriate approaches to collecting affirmations?

A.

No, emails are not appropriate affirmations.

B.

No, messaging is not an appropriate affirmation.

C.

Yes, the affirmations collected by the assessor are all appropriate.

D.

Yes, the affirmations collected by the assessor are all appropriate, as are screenshots.

Full Access
Question # 43

A CCP is part of a CMMC Assessment Team interviewing a subject-matter expert on Access Control (AC) within an OSC. During the interview process, what will the CCP ensure about the information exchanged during the interview?

A.

Performed in groups for more efficient use of resources

B.

Recorded for inclusion in the Final Recommended Findings report

C.

Confidential and non-attributable so interviewees can speak without fear of reprisal

D.

Mapped to specific CMMC practices to clearly delineate which practice is being evaluated

Full Access
Question # 44

A Lead Assessor is ensuring all actions have been completed to conclude a Level 2 Assessment. The final Assessment Results Package has been properly reviewed and is ready to be uploaded. What other materials is the Lead Assessor responsible for maintaining and protecting?

A.

Any additional notes and information from the Assessment

B.

A final assessment plan, and a Quality Control report from C3PAO

C.

A final assessment plan, and a letter from the Lead Assessor explaining the process

D.

A final assessment plan, a letter from the Lead Assessor explaining the results, and a Quality Control report from C3PAO

Full Access
Question # 45

Per DoDI 5200.48: Controlled Unclassified Information (CUI), CUI is marked by whom?

A.

DoD OUSD

B.

Authorized holder

C.

Information Disclosure Official

D.

Presidential authorized Original Classification Authority

Full Access
Question # 46

A client uses an external cloud-based service to store, process, or transmit data that is reasonably believed to qualify as CUI. According to DFARS clause 252.204-7012. what set of established security requirements MUST that cloud provider meet?

A.

FedRAMP Low

B.

FedRAMP Moderate

C.

FedRAMP High

D.

FedRAMP Secure

Full Access
Question # 47

As part of CMMC 2.0, the change to Level 1 Self-Assessments supports "reduced assessment costs" allows all companies at Level 1 (Foundational) to:

A.

to conduct self-assessments.

B.

opt out of CMMC Assessments.

C.

have assessment costs reimbursed by the DoD.

D.

pay no more than $500.00 for their annual assessment.

Full Access
Question # 48

Which statement BEST describes an assessor's evidence gathering activities?

A.

Use interviews for assessing a Level 2 practice.

B.

Test all practices or objectives for a Level 2 practice

C.

Test certain assessment objectives to determine findings.

D.

Use examinations, interviews, and tests to gather sufficient evidence.

Full Access
Question # 49

After a CMMC Level 2 certification assessment, the Lead Assessor (Lead CCA) is preparing to present the Final Recommended Findings to the OSC . Which statement BEST describes the Lead Assessor’s responsibility for delivering the assessment findings to the OSC?

A.

Summary recommendations presented using the CMMC Assessment Findings Brief are sufficient.

B.

Detailed findings must be presented to the OSC along with clear evidence of how the ratings map to the assessor’s findings.

C.

The initial report delivered to the OSC will only include an overall assessment MET or NOT MET score along with a score for each practice.

D.

The Lead Assessor is required to submit their initial assessment findings to the C3PAO for review before they can be shared with the OSC.

Full Access
Question # 50

When an OSC requests an assessment by a C3PAO, who selects the Lead Assessor for the assessment?

A.

OSC

B.

C3PAO

C.

C3PAO and OSC

D.

OSC and Lead Assessor

Full Access
Question # 51

An Assessment Team is conducting interviews with team members about their roles and responsibilities. The team member responsible for maintaining the antivirus program knows that it was deployed but has very little knowledge on how it works. Is this adequate for the practice?

A.

Yes, the antivirus program is available, so it is sufficient.

B.

Yes, antivirus programs are automated to run independently.

C.

No, the team member must know how the antivirus program is deployed and maintained.

D.

No, the team member's interview answers about deployment and maintenance are insufficient.

Full Access
Question # 52

In accordance with NARA directives and Chapter 33 of Title 44 (Records Management Directive), which types of data MUST have policies and procedures for disposal?

A.

All recorded digital documents

B.

All digital and recorded paper documents

C.

All digital documents and recorded media

D.

All recorded information, regardless of form or characteristics

Full Access
Question # 53

What is the primary intent of the verify evidence and record gaps activity?

A.

Map test and demonstration responses to CMMC practices.

B.

Conduct interviews to test process implementation knowledge.

C.

Determine the one-to-one relationship between a practice and an assessment object.

D.

Identify and describe differences between what the Assessment Team required and the evidence collected.

Full Access
Question # 54

Who has the initial responsibility for identifying and managing conflicts of interest?

A.

OSC

B.

C3PAO

C.

CMMC-AB

D.

Lead Assessor

Full Access
Question # 55

For the purpose of determining scope, what needs to be included as part of the assessment but would NOT receive a CMMC certification unless an enterprise assessment is conducted?

A.

ESP

B.

People

C.

Test equipment

D.

Government property

Full Access
Question # 56

Which phase of the CMMC Assessment Process includes developing the assessment plan?

A.

Phase 1

B.

Phase 2

C.

Phase 3

D.

Phase 4

Full Access
Question # 57

What are CUI protection responsibilities?

A.

Shielding

B.

Governing

C.

Correcting

D.

Safeguarding

Full Access
Question # 58

While conducting a CMMC Level 2 Assessment, a CCP is reviewing an OSC's personnel security process. They have a policy that describes screening individuals prior to authorizing access to CUI, but it does not mention what organizations should be looking for in an individual. There is no link to a process or procedural document. What should the OSC evaluate when screening individuals prior to accessing CUI?

A.

They are trusted and well liked

B.

They are a hard and loyal worker

C.

Their conduct, integrity, and loyalty

D.

Their functionality, reliability, and ability to adapt

Full Access
Question # 59

An OSC lead has provided company information, identified that they are seeking CMMC Level 2, stated that they handle FCI. identified stakeholders, and provided assessment logistics. The OSC has provided the company's cyber hygiene practices that are posted on every workstation, visitor logs, and screenshots of the configuration of their FedRAMP-approved applications. The OSC has not won any DoD government contracts yet but is working on two proposals Based on this information, which statement BEST describes the CMMC Level 2 Assessment requirements?

A.

Ready because there is no need to certify this company until after they win a DoD contract.

B.

Not ready because the OSC is not on contract because they do not know the scope of FCI protection required by the contract.

C.

Not ready because the OSC still lacks artifacts that prove they have implemented all the CMMC Level 2 Assessment requirements.

D.

Ready because all DoD contractors are required to achieve CMMC Level 2; therefore, they are being proactive in seeking certification.

Full Access
Question # 60

Which domain references the requirements needed to handle physical or digital assets containing CUI?

A.

Media Protection (MP)

B.

Physical Protection (PE)

C.

System and Information Integrity (SI)

D.

System and Communications Protection (SC)

Full Access
Question # 61

In the CMMC Model, how many practices are included in Level 1?

A.

15 practices

B.

17 practices

C.

72 practices

D.

110 practices

Full Access
Question # 62

Who is responsible for ensuring that subcontractors have a valid CMMC Certification?

A.

CMMC-AB

B.

OUSD A & S

C.

DoD agency or client

D.

Contractor organization

Full Access
Question # 63

Which document is the BEST source for determining the sources of evidence for a given practice?

A.

NISTSP 800-53

B.

NISTSP 800-53A

C.

CMMC Assessment Scope

D.

CMMC Assessment Guide

Full Access
Question # 64

The CMMC Level 2 assessment methods include examination and can include:

A.

documents, mechanisms, or activities.

B.

specific hardware, software, or firmware safeguards employed within a system.

C.

policies, procedures, security plans, penetration tests, and security requirements.

D.

observation of system backup operations, exercising a contingency plan, and monitoring network traffic.

Full Access
Question # 65

Which document is the BEST source for descriptions of each practice or process contained within the various CMMC domains?

A.

CMMC Glossary

B.

CMMC Appendices

C.

CMMC Assessment Process

D.

CMMC Assessment Guide Levels 1 and 2

Full Access
Question # 66

During a POA & M closeout assessment , the Lead Assessor and team members verified all evidence provided by the OSC and passed those that satisfied the requirements. Who MUST verify that every failed practice from the initial original assessment has been adequately addressed?

A.

OSC

B.

CCA

C.

OSC sponsor

D.

Lead Assessor

Full Access