Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cyber AB CMMC-CCP - Certified CMMC Professional (CCP) Exam

Page: 2 / 7
Total 228 questions

Prior to conducting a CMMC Assessment, the contractor must specify the CMMC Assessment scope by categorizing all assets. Which two asset categories are always assessed against CMMC practices?

A.

CUI Assets and Specialized Assets

B.

Security Protection Assets and CUI Assets

C.

Specialized Assets and Contractor Risk Managed Assets

D.

Security Protection Assets and Contractor Risk Managed Assets

An Assessment Team Member is conducting a CMMC Level 2 Assessment for an OSC that is in the process of inspecting Assessment Objects for AC.L1-3.1.1: Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems) to determine the adequacy of evidence provided by the OSC. Which Assessment Method does this activity fall under?

A.

Test

B.

Observe

C.

Examine

D.

Interview

A contractor stores security policies, system configuration files, and audit logs in a centralized file repository for later review. According to CMMC terminology, the file repository is being used to:

A.

protect CUI.

B.

transmit CUI.

C.

store CUI.

D.

generate CUI

An organization's sales representative is tasked with entering FCI data into various fields within a spreadsheet on a company-issued laptop. This laptop is an FCI Asset being used to:

A.

process and transmit FCI.

B.

process and organize FCI.

C.

store, process, and transmit FCI.

D.

store, process, and organize FCI.

Which term describes "the protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to. or modification of information"?

A.

Adopted security

B.

Adaptive security

C.

Adequate security

D.

Advanced security

While conducting a CMMC Assessment, an individual from the OSC provides documentation to the assessor for review. The documentation states an incident response capability is established and contains information on incident preparation, detection, analysis, containment, recovery, and user response activities. Which CMMC practice is this documentation attesting to?

A.

IR.L2-3.6.1: Incident Handling

B.

IR.L2-3.6.2: Incident Reporting

C.

IR.L2-3.6.3: Incident Response Testing

D.

IR.L2-3.6.4: Incident Spillage

The evidence needed for each practice and/or process is weighed for:

A.

Adequacy and sufficiency

B.

Adequacy and thoroughness

C.

Sufficiency and thoroughness

D.

Sufficiency and appropriateness

The IT manager is scoping the company's CMMC Level 1 Self-Assessment. The manager considers which servers, laptops. databases, and applications are used to store, process, or transmit FCI. Which asset type is being considered by the IT manager?

A.

ESP

B.

People

C.

Facilities

D.

Technology

As defined in the CMMC-AB Code of Professional Conduct, what term describes any contract between two legal entities?

A.

Union

B.

Accord

C.

Alliance

D.

Agreement

Which domain has a practice requiring an organization to restrict, disable, or prevent the use of nonessential programs?

A.

Access Control (AC)

B.

Media Protection (MP)

C.

Asset Management (AM)

D.

Configuration Management (CM)