Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cyber AB CMMC-CCA - Certified CMMC Assessor (CCA) Exam

Page: 1 / 5
Total 150 questions

While examining the customer responsibility matrix submitted by the OSC for one of its Cloud Service Providers (CSPs), the Assessor notes that the matrix was substantially completed by the OSC’s RPO. In fact, there is a statement from the RPO that the CSP has met the requirements for FedRAMP MODERATE.

In order to accept that this CSP is qualified to perform some of the practices on behalf of the OSC, what should occur?

A.

The CSP must have its service certified for FedRAMP by a certified C3PAO.

B.

The OSC should provide the contract documents for the CSP specifying that it must meet NIST SP 800-171 practices.

C.

The OSC must be able to demonstrate that the CSP is providing its services in a manner that complies with CMMC Level 2.

D.

There must be other evidence that an independent firm has confirmed the security controls meeting FedRAMP MODERATE are in place.

A company is undergoing a CMMC Level 2 Assessment. The Assessment Team is planning and preparing the assessment. Who is responsible for identifying methods, techniques, and responsibilities for collecting, managing, and reviewing evidence?

A.

Lead Assessor

B.

Assessment Team Member

C.

C3PAO Quality Oversight Manager

D.

CMMC Quality Assurance Professional

While scoping the assessment, the assessor learns that the OSC uses various cloud-based solutions sporadically as part of its normal course of business. The OSC states that most business is conducted on-premises and that only a small amount of business uses the cloud. The OSC thinks the cloud is only used for system backups, but there are isolated exceptions.

Are the data provided sufficient to determine that the OSC limits connection to external information systems?

A.

No, the OSC stated most of its business is on-premises.

B.

No, the OSC did not fully define the extent external connections are used.

C.

Yes, the OSC confirmed that external connections occur.

D.

Yes, the OSC confirmed that external connections occur for system backups.

Which of the following can be taken into consideration when assessing AC.L2-3.1.3 Privacy & Security Notices?

A.

System use notifications during system log-in

B.

Alerts received from Intrusion Detection and Protection devices

C.

Posters in the workplace warning of the dangers of phishing and shoulder-surfing

D.

Sending out notices in email reminding employees to be conscious of security concerns

The assessment team has divided responsibilities to review portions of the OSC’s scope, including the Host Unit, the specific enclave, and supporting teams such as a Managed Security Service Provider (MSSP). During evidence review, the team notices that MSSP personnel answered interview questions somewhat differently than OSC personnel. To clarify this inconsistency, the Lead Assessor decides to take all the following steps EXCEPT:

A.

Review the network diagrams.

B.

Review the agreement with the MSSP.

C.

Review the notes to determine what was different.

D.

Review interview questionnaire consistency.

While conducting a CMMC Level 2 gap analysis with a large defense contractor, a CMMC RP confirms that the organization uses a RADIUS server for authentication. What additional method could be used to comply with AC.L2-3.1.17: Wireless Access Protection?

A.

Layer 3 switch

B.

Intrusion detection solution

C.

WPA2-Enterprise encryption

D.

Frequency-hopping wireless access

Testing is one assessment method the Lead Assessor may choose depending on the assessment scope and evidence provided by the OSC. During the Plan Phase, the Lead Assessor and OSC POC agree on who the people are that are involved in a particular practice so that it could be tested if determined appropriate. During the discussion, the OSC POC tells the Lead Assessor that the production system is in use and cannot be stopped for the testing to take place but offers a mirrored system for testing. The Lead Assessor decides:

A.

Only to test the processes conducted by the supporting groups

B.

Only to test the Customer Matrices that are available

C.

Not to perform testing as a mirrored system is not an acceptable substitute for the production system

D.

To ask the OSC for evidence that a mirrored system is exactly the same as the production system to conduct testing

An assessor is examining an organization’s system maintenance program. While reviewing the system maintenance policy and the OSC’s maintenance records for the CUI network, the assessor notices there is no mention of printers. The assessor asks the IT manager if the company has any printers.

Why is the assessor concerned if the OSC has printers?

A.

Printers must be completely isolated from all non-CUI assets.

B.

Firmware on a network printer needs to have updates as needed.

C.

Printers cannot be used on a CUI network without government approval.

D.

Printers can produce hard copies of CUI data that need to be safeguarded.

Different mechanisms can be used to protect information at rest. Which mechanism is MOST LIKELY to afford protection for information at rest?

A.

Patching

B.

File share

C.

Secure offline storage

D.

Cryptographic mechanisms

An OSC seeking Level 2 certification is reviewing the physical security of their building. Currently, the building manager unlocks and locks the doors for business operations. The OSC would like the ability to automatically unlock the door for authorized personnel, track access individually, and maintain access history for all personnel. The BEST approach is for the OSC to:

A.

Maintain a list of authorized personnel and assign them a building key.

B.

Maintain security cameras to continuously monitor access to the building.

C.

Install a badge system and require each individual to use their badge to gain entry to the building.

D.

Install a keypad system and require the entry code to be changed when an individual leaves the company.