New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cyber AB CMMC-CCA - Certified CMMC Assessor (CCA) Exam

Page: 2 / 5
Total 150 questions

When a new employee is issued a laptop, only the user’s credentials need to be set up. According to the IT department, the IT manager is the only person who can change laptop setup and user privileges. What documentation should be examined to determine if this is the case?

A.

System audit logs

B.

Inventory records

C.

Acceptable use policy

D.

Remote access procedures

In validating the OSC’s implementation of AC.L2-3.1.16: Wireless Access Authorization, the CCA observes various personal and non-enterprise devices connected to the OSC’s Wi-Fi. Because organizations handle wireless access differently, the CCA must locate evidence showing who has ultimate authority over wireless access. Which authority is acceptable for authorizing wireless access?

A.

The CEO mandating IT to add their personal phone to the company Wi-Fi

B.

A written policy executed by the CEO listing the pre-authorization requirements for Wi-Fi connectivity

C.

The CEO emailing the company instructing everyone to put personal devices on the company Wi-Fi

D.

A detailed document from the head of IT with instructions on how to connect to the guest Wi-Fi network

An in-house compliance expert for a large defense contractor is reviewing the organization’s training materials for personnel handling CUI. After a widely publicized insider threat incident, management requires that training address insider threat risks. What is a critical component of insider threat awareness training?

A.

A bounty system for identifying and stopping insider threats

B.

A company-wide ranking of individuals by insider threat risk

C.

Law enforcement case studies on known insider threat activities

D.

Processes and procedures for reporting suspected insider threat activity

The assessment team is discussing the pre-assessment scope with an OSC. The OSC would like to limit the scope of the security requirements in environments that contain FCI and/or CUI. In this case, the OSC should:

A.

Request a single CMMC certification for both activities

B.

Choose to conduct two separate CMMC certification activities

C.

Define an Assessment Scope for those assets that process, store, or transmit FCI

D.

Define a CMMC Self-Assessment Scope for only those assets that process, store, or transmit CUI

NIST SP 800-171A specifies the assessment methods for defining the nature and the extent of a CCA’s actions. What is the purpose of the test assessment method?

A.

To review, inspect, observe, or analyze assessment objects

B.

To review compliance with an applicable standard and security assurance claims

C.

To exercise assessment objects under specified conditions to compare actual with expected behavior

D.

To execute a systematic process, procedure, or technique for obtaining security assurance evidence and consistently verifying security assurance claims

A company employs an encrypted VPN to enhance confidentiality over remote connections. The CCA reads a document describing the VPN. It states the VPN allows automated monitoring and control of remote access sessions, helps detect cyberattacks, and supports auditing of remote access to ensure compliance with CMMC requirements.

What document is the CCA MOST LIKELY reviewing to see how these VPNs are controlled and monitored?

A.

Access Control Policy

B.

Media Protection Policy

C.

Audit and Accountability Policy

D.

Configuration Management Policy

During a CMMC Level 2 Assessment, a CCA interviewed a system administrator on the OSC’s procedures around configuration management and endpoint security. The system administrator described how they build and deploy new systems, and noted that some users require specialized applications for their jobs. Users have been asked to email IT when they install and run an additional application so IT can add it to their list of allowed software.

What must the CCA conclude?

A.

The OSC has properly implemented application deny listing.

B.

The OSC has not properly implemented application allow listing.

C.

IT must deploy an application to report newly installed software.

D.

IT does not have a policy that users notify IT when they install new applications.

While examining evidence, a CCA is trying to confirm the claim that the OSC has identified all information system users, processes acting on behalf of users, and all devices.

Which of the following provides the STRONGEST evidence of this practice?

A.

Lists of system accounts and devices and system audit logs and records

B.

System design documentation and other relevant documents or records

C.

Procedures addressing user and system identification and authentication and SSP

D.

Identification and authentication policy and system configuration settings and associated documentation

During the Planning Phase of the Assessment Plan, the assessor determines that the Client will likely include sensitive and proprietary CUI. What should the assessor consider as part of their virtual data collection techniques for this information?

A.

The Client is responsible for safeguarding the data during collection, not the assessor.

B.

The assessor is responsible for safeguarding the data during collection, not the client.

C.

The assessor should record the risks and mitigations to protect the CUI categories handled.

D.

The client and assessor should record the risks and mitigations to protect the CUI categories handled.

An OSC seeking Level 2 certification has recently configured system auditing capabilities for all systems within the assessment scope. The audit logs are generated based on the required events and contain the correct content that the organization has defined.

Which of the following BEST describes the next system auditing objective that the organization should define?

A.

Centralized audit log collection

B.

Integration of all system audit logs

C.

Review and update of logged events

D.

Retention requirements for audit records