New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cyber AB CMMC-CCA - Certified CMMC Assessor (CCA) Exam

Page: 3 / 5
Total 150 questions

A company is undergoing a CMMC Level 2 Assessment. During the Conduct Assessment phase, an Assessment Team member is reviewing the policies and procedures in the incident response plan.

Which assessment method is being utilized?

A.

Test

B.

Examine

C.

Interview

D.

Observation

An OSC assigns new hires to work on their hire date. Human Resources ensures that all screening activities are completed before the end of the employees’ first week. How should the CCA score PS.L2-3.9.1: Screen Individuals?

A.

As NOT MET but it can be remediated post-assessment

B.

As NOT MET and this will cause the assessment to fail

C.

As MET since the OSC ensured Human Resources was handling the screening

D.

As NOT MET because all screening must be completed prior to the start of employment

While conducting a Level 2 Assessment, the Assessment Team begins reviewing assessment objects. The team identifies concerns with several of the objects presented. Which artifacts would require the MOST verification?

A.

Current artifacts produced by individuals performing the work

B.

Artifacts created 18 months ago by individuals performing the work

C.

Current artifacts produced by individuals that work for a separate entity of the company

D.

Artifacts created 18 months ago by individuals that work for a separate entity of the company

A company has a firewall to regulate how data flows into and out of its network. Based on an interview with their IT staff, all connections to their systems are logged, and suspicious traffic generates alerts. Examination of which artifact should give the CCA the details on how these are implemented?

A.

Physical access logs

B.

Boundary protection procedures

C.

Account management document

D.

Configuration management policy

A CCA is prohibited from doing which of the following?

A.

Verifying key internal system boundaries

B.

Determining if physically separated assets contain CUI

C.

Ensuring the external system boundary is fully defined

D.

Examining whether communications are monitored at the external system boundary

During an assessment, the IT security engineers responsible for password policy for the OSC provided documentation that all passwords are protected using a one-way hashing methodology. As a result, which statement is true?

A.

Passwords are protected in storage and in transit.

B.

Passwords are transmitted across the network as clear cipher-text.

C.

The password protection allows access but not authorization to assets.

D.

The transformation makes it impossible to re-convert the hashed password.

While conducting a CMMC Level 2 Third-Party Assessment of a small defense contractor, an assessor discovers that the contractor’s Information Security Policy has no documented change records demonstrating executive approval. The IT director states that they will add change records in the future, but that other evidence exists. Which documentation is MOST able to demonstrate persistent and habitual adherence to CMMC requirements?

A.

Handwritten notes from executive committee meetings discussing implementation

B.

Several years’ worth of saved emails from the executive team approving policies and directing adherence

C.

A notarized letter from the previous CEO stating that they approved information security policies annually

D.

Transcribed interviews with new employees discussing their understanding of information security policies

During preparations for a CMMC Level 2 Assessment, a client submits a request to their consulting RP to learn more about Specialized Asset requirements. The client is unsure if their camera system, used for safety data collection purposes within their machining shop, should be documented within the SSP. Which reason is a satisfactory reason to exclude the camera system from the SSP, and thus the assessment scope?

A.

The video data are deleted every seven days.

B.

The Technology Control Plan does not address the camera system.

C.

The camera data are uploaded to a FedRAMP MODERATE authorized cloud storage system.

D.

The camera system network is physically and logically isolated and does not capture data related to controlled projects.

Some OSCs share real estate with other companies. To protect FCI/CUI behind unmanned entrances to buildings, floors, or other areas where FCI/CUI is created, used, stored, or transmitted, which of the following is the BEST method?

A.

Turnstiles to limit access

B.

Cameras to monitor and record foot traffic

C.

Bold signage with strong language to discourage entry

D.

One-way gates which require proper credentials or intercom authorization to unlock and permit entry

The Lead Assessor concludes that the OSC is not ready for the assessment. After the Readiness Assessment Review, the OSC and the Lead Assessor could choose to:

A.

Replan or cancel the assessment.

B.

Replan or reschedule the assessment.

C.

Proceed as planned or cancel the assessment.

D.

Proceed as planned or reschedule the assessment.