New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cyber AB CMMC-CCA - Certified CMMC Assessor (CCA) Exam

Page: 4 / 5
Total 150 questions

A company has a server in its own Virtual Cloud used as a CUI enclave. There is a point-to-point VPN between the OSC’s office and the cloud environment. Designated users have direct access to the enclave when in the office. When working remotely, those users must establish a VPN connection between their company laptop and the cloud server.

During the assessment, the CCA asks the IT manager about external connections.

How many external connections are within the boundary for this assessment?

A.

The system has one external connection through the VPN when working outside the office.

B.

The system has no external connections since the OSC operates the connections and the enclave.

C.

The system has one external connection through the dedicated VPN between the office and the Cloud.

D.

The system has two external connections: one through the user-initiated VPNs and one to the company’s office.

When preparing for an assessment, the assessor determines that the client’s proprietary data resides within an enclave. However, the assessor is unable to review policies containing proprietary data onsite and plans to have the policies copied on removable media by the client’s IT staff, whom they are scheduled to interview. What should the assessor consider as part of their planning?

A.

No proprietary data can leave the client’s environment under any circumstances.

B.

The assessor can transmit data outside the client’s environment if the client’s IT support staff grants access.

C.

No proprietary data can leave the client’s environment without the express written consent of the OSC POC.

D.

No proprietary data can leave the client’s environment without the express written consent of the OSC Assessment Official.

During a company’s assessment, the CCA notices that the server room door is kept open with a fan in the entryway because the cooling system is inadequate and the machines are overheating. According to the physical protection policy, the server room’s keypad is the mechanism for managing and controlling access to this equipment, and only the IT team should have access to the server room. However, with the door open, the keypad is not necessary, and anyone can enter the room.

The CCA asks the IT manager how access to this room is protected while the door is open. Which response would allow the company to still meet the physical security requirement?

A.

“Only employees are allowed in this area.”

B.

“We trust our employees not to enter the room if they are not supposed to.”

C.

“The server is located inside another room that only the IT team has access to.”

D.

“The CEO emailed all employees that the server room door would be kept open but only the IT team should enter.”

A CCA is assessing the implementation of the Incident Reporting practice. To validate the control, what MUST the CCA ensure about the OSC?

A.

Incidents are tracked and documented

B.

Incident sources are configured and tuned

C.

Law enforcement officials are automatically notified during an incident

D.

Forensic investigations are performed to determine the impact of the incident

An OSC has a testing laboratory. The lab has several pieces of equipment, including a workstation that is used to analyze test information collected from the test equipment. All equipment is on the same VLAN that is part of the certification assessment. The OSC claims that the workstation is part of the test equipment (Specialized Asset) and only needs to be addressed under risk-based security policies. However, the OSC states that the data analysis output is CUI. What is the assessor’s BEST response?

A.

Disagree with the OSC and include the workstation in the full assessment.

B.

Disagree with the OSC and score practice CA.L2-3.12.4: System Security Plan as NOT MET.

C.

Agree with the OSC but perform a limited check of the system, not increasing the assessment cost or duration.

D.

Agree with the OSC and determine if it is managed using the contractor’s risk-based information security procedures and practices.

During the assessment of a company, the CCA learns that 50% of employees work from home using remote access. After reviewing the Access Control policy and audit logs, the CCA is unsure how the system ensures only employees with correct privileges can access CUI. The CCA decides a Test of functionality is required. Which question is of the LEAST concern to the CCA?

A.

Are remote access sessions necessary?

B.

Are remote access sessions permitted?

C.

Are remote access sessions monitored?

D.

Are the types of permitted remote access identified?

The Assessment Team is meeting with the OSC team and experiences a situation where some members of the OSC team describe the IT infrastructure differently from others. In some discussions, one person identifies a series of ESPs, while another describes the infrastructure as on-premises. What should the Lead Assessor do to clarify the actual operational environment?

A.

Review the network diagrams

B.

Interview an authoritative OSC representative

C.

Review the system interconnection agreements

D.

Ask for the contact information of the identified ESPs

A company receives data that they suspect is CUI, but it is not marked as such. What is an acceptable way for the company to handle unmarked potential CUI?

A.

Treat all data as CUI even if not marked.

B.

If data are not marked, then they are not CUI.

C.

Have a procedure for deleting unlabeled data.

D.

Have a procedure for proper handling of unlabeled data.

A C3PAO has contracted by an OSC to perform its assessment. Before the assessment, the Lead Assessor asks the OSC to provide an extensive list of evidence, some of which is optional and beyond the minimum requirements. The OSC is not able to fulfill the entire request. One missing document was a current and organized list of the OSC’s evidence and mappings.

Given that this is a Level 2 Assessment, what should the Lead Assessor tell the OSC?

A.

“The OSC’s Assessment Official will be asked to collect evidence when requested by the assessment team.”

B.

“The OSC must provide the Assessment Team with hardcopy evidence. Electronic evidence will only be collected when needed.”

C.

“It’s okay that the document is missing. The Assessment Team will collect all evidence themselves to ensure its integrity.”

D.

“The OSC should provide the Assessment Team with a current and organized list of their evidence and process mappings, but the assessment can continue.”

AC.L2-3.1.6: Non-Privileged Account Use is being assessed. Which procedure BEST meets all of the standards for non-privileged account use?

A.

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for security tasks.

B.

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their non-privileged account for security tasks.

C.

All non-IT employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for all tasks.

D.

All non-IT employees are given a non-privileged user account.

System Administrators are given only an administrator account.

System Administrators use their administrator account for all tasks.