Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Cyber AB CMMC-CCA Certified CMMC Assessor (CCA) Exam Exam Practice Test

Page: 1 / 15
Total 150 questions

Certified CMMC Assessor (CCA) Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

During the assessment of a company, the CCA learns that 50% of employees work from home using remote access. After reviewing the Access Control policy and audit logs, the CCA is unsure how the system ensures only employees with correct privileges can access CUI. The CCA decides a Test of functionality is required. Which question is of the LEAST concern to the CCA?

Options:

A.

Are remote access sessions necessary?

B.

Are remote access sessions permitted?

C.

Are remote access sessions monitored?

D.

Are the types of permitted remote access identified?

Question 2

The Lead Assessor is conducting an assessment for an OSC. The Lead Assessor has finished collecting and examining evidence from the assessment.

Based on this information, what is the NEXT logical step?

Options:

A.

Develop an assessment plan.

B.

Deliver recommended assessment results.

C.

Generate final recommended assessment results.

D.

Determine and record initial practice scores.

Question 3

The OSC prints out documents it receives via email that are marked as CUI. According to MP.L2-3.8.4: Media Markings,

what should the Assessor expect to see on the printouts?

Options:

A.

A red stamp that states the document contains CUI

B.

Written limitations to the distribution of the CUI within the OSC

C.

The original markings that were on the document emailed to the OSC

D.

The original markings from the document and a distribution list with limitations

Question 4

The OSC’s network consists of a single network switch that connects all devices. This includes the OSC’s OT equipment, which processes CUI. The OT controller requires an unsupported operating system.

What can the Lead Assessor BEST conclude about the overall compliance with MA.L2-3.7.1: Perform Maintenance?

Options:

A.

It is MET only if every asset that is not a Specialized Asset is maintained.

B.

It is MET only if the environments are demarcated on the baseline diagram.

C.

It is NOT MET because industrial equipment should not be processing CUI.

D.

It is NOT MET because the OSC has not managed the risk of a CUI system being outdated.

Question 5

An OSC seeking Level 2 certification is migrating to a fully cloud-based environment. The organization wants to select a Cloud Service Provider (CSP) that can share responsibilities for CMMC Level 2 requirements. Assume both CSPs can equally provide the technical capabilities and business value required.

    CSP A has SOC 2 certification and is California Consumer Privacy Act (CCPA) and Health Insurance Portability and Accountability Act (HIPAA) compliant.

    CSP B has SOC 2 and FedRAMP Moderate certifications.

Based on this information, which CSP is MOST LIKELY to be acceptable?

Options:

A.

CSP A

B.

CSP B

C.

Both CSP A and B

D.

Neither CSP A nor B

Question 6

In completing the assessment of practices in the Access Control (AC) domain, a CCA scored AC.L2-3.1.15: Privileged Remote Access as NOT MET. The OSC was notified of this deficiency at the end of day two of the assessment. On day five of the assessment, the OSC’s Assessment Official contacted the CCA to provide evidence that the deficiencies have been corrected.

What is the CCA’s NEXT step?

Options:

A.

This practice is not eligible for deficiency correction and should be scored as NOT MET.

B.

This practice is not eligible for deficiency correction, should be scored as NOT MET, and reevaluated during a POA&M Close-Out Assessment.

C.

This practice is eligible for deficiency correction and should be scored as MET but must be reevaluated during a POA&M Close-Out Assessment.

D.

This practice is eligible for deficiency correction, should be scored as NOT MET, and evaluated during the Limited Deficiency Correction evaluation.

Question 7

The Assessment Team is meeting with the OSC team and experiences a situation where some members of the OSC team describe the IT infrastructure differently from others. In some discussions, one person identifies a series of ESPs, while another describes the infrastructure as on-premises. What should the Lead Assessor do to clarify the actual operational environment?

Options:

A.

Review the network diagrams

B.

Interview an authoritative OSC representative

C.

Review the system interconnection agreements

D.

Ask for the contact information of the identified ESPs

Question 8

A company has multiple sites with employees at each site that must access the company’s CUI network from their remote locations. The company has set up a single access point for all employees to access the network. What is the MOST significant factor in determining whether the security on this single access point is adequate?

Options:

A.

Remote access is secured and monitored.

B.

Physical access is monitored and controlled.

C.

The security requirements for CUI and FCI are documented.

D.

The remote personnel have notification procedures regarding connection issues.

Question 9

A company mirrors its FCI/CUI data storage in a cloud environment. Data is managed across multiple virtual machines (VMs). To satisfy requirements for data security of the LOCAL copy using physical controls, what should the OSC do?

Options:

A.

Use encrypted transport and storage of FCI/CUI data on the VMs.

B.

Store FCI/CUI data without encryption for faster access/backup/restore.

C.

Ensure that the VMs are running on hardware that is physically located in a controlled-access facility.

D.

In addition to a password or personal identification number, use physical means to log in such as a smart card or hard token.

Question 10

An OSC is undergoing CMMC Assessment on an enterprise-wide basis. While walking to the conference room, the Assessor notices a printer repair technician in the hallway, unescorted, repairing a printer marked “Authorized for CUI printing.” What is the NEXT step the Lead Assessor should take regarding PE.L2-3.10.3: Escort Visitors?

Options:

A.

Make a note and score the practice as MET

B.

Ask the printer technician to leave immediately

C.

Make a note and score the practice as NOT MET

D.

Ask the OSC if the printer technician has authorized access

Question 11

While conducting a CMMC Level 2 assessment at a 100-person manufacturing company, the assessor receives a yellow badge labeled “SPECIAL ACCESS.” The assessor observes multiple badge types used by staff and visitors. The client explains that only three badge colors correspond to controlled access (with electronic access), while the rest are identifiers for seniority. How can the assessor BEST verify that the three colors are the only badges capable of accessing controlled areas for CUI-related activities?

Options:

A.

Interviewing CUI-cleared staff

B.

Reviewing standard operating procedures for badge issuance

C.

Reviewing retained electronic badge entry logs or audits thereof

D.

Borrowing a badge from another staff member and attempting to enter a controlled space

Question 12

The Lead Assessor is reviewing the Assessment Plan to identify people for interviews regarding a specific Level 2 practice. Some OSC personnel previously interviewed provided only brief answers without meaningful verification. What can the Lead Assessor do to improve this situation going forward?

Options:

A.

Ensure the people from the training matrix are made available

B.

Ensure and verify confidentiality and non-attribution of responses

C.

Ensure the respondents sign a non-disclosure agreement for the OSC

D.

Ensure and verify the responses map to the documented artifacts

Question 13

ESPs are exceptionally common today, given that many organizations are turning to secure cloud offerings to establish and maintain compliance. Integral to these relationships is a responsibility matrix, which defines who is responsible for specific items such as security. This can be a very complex assortment of taskings associated with federal compliance, but what is the MOST important thing to remember?

Options:

A.

The ESP is technically not part of the DIB and has no responsibility to be CMMC compliant in its own right.

B.

The CMMC Assessment Team will factor in any documentation provided by the ESP when evaluating the OSC for compliance.

C.

The relationship of an OSC with an ESP is a partnership and the CMMC Assessment will evaluate the ESP at the same time as the OSC.

D.

Only the OSC is being assessed for compliance, and while the ESP may have a lot of responsibilities in the matrix, the OSC is ultimately responsible for meeting the requirements as specified by government mandates.

Question 14

An OSC is preparing for an assessment and wants to gather evidence that will be used by the Lead Assessor to determine the scope of the assessment. The OSC currently operates a hybrid network, with part of their infrastructure at their physical location and part of their infrastructure in a cloud environment.

What evidence should the OSC collect that would assist the Lead Assessor in determining cloud and hybrid environment constraints?

Options:

A.

Subnetworks list

B.

System inventory

C.

Company-owned hardware list

D.

Cloud Service Provider’s Customer Responsibility Matrix

Question 15

A CCA is asked to validate if an OSC has separated their systems containing CUI from other departments’ systems on their local network. Which of the following MUST the CCA assess?

Options:

A.

Area Network (WAN)

B.

Virtual Private Network (VPN)

C.

Virtual Local Area Network (VLAN)

D.

Network Address Translation (NAT)

Question 16

A CCA is assessing the implementation of SC.L2-3.13.7: Split Tunneling control via the examine method. Which scenario MUST be correct to determine if the practice is MET?

Options:

A.

The CCA tested that VPN mechanisms disallow split tunneling.

B.

The CCA corroborated that split tunneling is disabled with a system or network administrator.

C.

The CCA determined that split tunneling mechanisms have been disabled based on the system hardware, software, and architecture.

D.

The CCA evaluated that split tunneling mechanisms have been disabled based on the mechanisms supporting or restricting non-remote connections.

Question 17

A CCA is conducting an interview with an OSC team member about an offering from a well-known Cloud Service Provider (CSP). The offering is known to be secure, but the OSC has not provided evidence and the person being interviewed is unsure how the offering works. Will this offering be accepted by the Assessment Team?

Options:

A.

Yes, because of the process of reciprocity

B.

No, the OSC failed to train on the offering

C.

No, because the OSC lacks adequate and sufficient evidence

D.

Yes, because the CSP offering is a well-known, secure offering

Question 18

An Assessor is evaluating whether an OSC has implemented adequate controls to meet AC.L2-3.1.7: Privileged Functions. The OSC has procedures that define privileged vs. non-privileged account provisioning and an access control policy that restricts execution of certain functions only to privileged users.

What might the Assessor do to further evaluate the implementation of this practice?

Options:

A.

Examine system logs to verify automatic updates are being applied.

B.

Test whether the application of a patch is captured in system logging.

C.

Test whether a non-privileged user can log into a system where CUI is stored.

D.

Examine a user access list for users that are authorized to access a key management system.

Question 19

An OSC processes data in its owned data center. The data center includes a very early smoke detection apparatus (VESDA). The apparatus only captures log information from its sensors around the data center. It is not intended, nor capable of, processing CUI. The VESDA is on a separate VLAN and is in a separate locked room in the data center.

Should the assessor agree that the VESDA is out-of-scope?

Options:

A.

Yes. The VESDA is physically and logically separated from the other data center equipment, and it is not intended nor capable of processing CUI.

B.

No. Even though the sensors are out-of-scope, the VESDA could provide access to the outside network if sensors were misused, and CUI could be exfiltrated.

C.

No. Even though the VESDA controller is in a locked room and on a separate VLAN, the VESDA is an essential security function as an early warning system.

D.

Yes. The VESDA serves a non-data processing purpose and is only connected to sensors. Sensors are out-of-scope, so the VESDA is out-of-scope.

Question 20

An assessor is trying to determine if an OSC performs scans of their information system and real-time scans of files from external sources as files are downloaded or executed.

Which evidence is LEAST LIKELY to help this assessor?

Options:

A.

System configuration settings

B.

System Information and Integrity Policy

C.

Alerts from the anti-virus software

D.

Interviews with personnel with configuration management responsibility

Question 21

An OSC is presenting evidence of its fulfillment of CM.L2-3.4.1: System Baselining. It provides:

    System inventory records showing additions/removals of machines,

    Software inventory showing installations/removals, and

    A system component installation plan with software needs and user specifications.

What other documentation MUST the company present to illustrate compliance with CM.L2-3.4.1?

Options:

A.

Documentation of the physical safeguards protecting the “gold” baseline images

B.

Documentation of a formal baseline review integrated with a system development lifecycle

C.

Documentation of any authorized deviations from the system baselines for end-user computers

D.

Documentation of a formal chain of custody for new hardware on which baselines will be installed

Question 22

While conducting a CMMC Level 2 self-assessment, an organization’s Chief Information Security Officer asks the system administrator for evidence that remote access is routed through fully managed access control points. Which documentation would BEST demonstrate that all remote access is routed through managed access control points?

Options:

A.

Network diagram and VPN logs

B.

Access control policy and procedures

C.

SSP and vendor management

D.

Cloud service audit logs and hardware asset inventory

Question 23

The Lead Assessor is compiling the assessment results, which must contain the status for each of the applicable practices. Some practices have been placed in the limited practice deficiency correction program. Multiple areas have been reviewed, including HQ, host units, and a specific enclave.

In order to properly report the findings, the Lead Assessor MUST:

Options:

A.

Identify items that were moved to the POA&M.

B.

Confirm the final findings are aggregated to the OSC level.

C.

Record the agreements made with the OSC Assessment Official.

D.

Ensure the report includes all of the evidence that has been collected.

Question 24

AC.L2-3.1.6: Non-Privileged Account Use is being assessed. Which procedure BEST meets all of the standards for non-privileged account use?

Options:

A.

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for security tasks.

B.

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their non-privileged account for security tasks.

C.

All non-IT employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for all tasks.

D.

All non-IT employees are given a non-privileged user account.

System Administrators are given only an administrator account.

System Administrators use their administrator account for all tasks.

Question 25

The Lead Assessor has conducted an assessment for an OSC. The OSC’s practices have been scored and preliminary results validated. Based on this information, what is the NEXT logical step?

Options:

A.

Determine CMMC Assessment scope.

B.

Deliver recommended assessment results.

C.

Consider additional evidence and record gaps.

D.

Create, finalize, and record recommended final findings.

Question 26

Testing is one assessment method the Lead Assessor may choose depending on the assessment scope and evidence provided by the OSC. During the Plan Phase, the Lead Assessor and OSC POC agree on who the people are that are involved in a particular practice so that it could be tested if determined appropriate. During the discussion, the OSC POC tells the Lead Assessor that the production system is in use and cannot be stopped for the testing to take place but offers a mirrored system for testing. The Lead Assessor decides:

Options:

A.

Only to test the processes conducted by the supporting groups

B.

Only to test the Customer Matrices that are available

C.

Not to perform testing as a mirrored system is not an acceptable substitute for the production system

D.

To ask the OSC for evidence that a mirrored system is exactly the same as the production system to conduct testing

Question 27

During an assessment, the OSC IT security team provided documentation on how they use replay-resistant authentication to protect CUI. What can be used as a replay-resistant mechanism?

Options:

A.

Encrypted messages

B.

Biometric techniques

C.

Requiring Transport Layer Security (TLS)

D.

MFA devices to protect access for local users

Question 28

During a CMMC Assessment, the assessor is determining if the Escort Visitors practice is MET. Personnel with which of the following responsibilities would be MOST appropriate to interview?

Options:

A.

Repair and facilities maintenance

B.

Local access control and information security

C.

Physical access control and information security

D.

Information technology management and operations

Question 29

A company is undergoing a CMMC Level 2 Assessment. The Assessment Team is planning and preparing the assessment. Who is responsible for identifying methods, techniques, and responsibilities for collecting, managing, and reviewing evidence?

Options:

A.

Lead Assessor

B.

Assessment Team Member

C.

C3PAO Quality Oversight Manager

D.

CMMC Quality Assurance Professional

Question 30

What is NOT required for the Lead Assessor to confirm when verifying readiness to conduct an assessment?

Options:

A.

That risks have been identified

B.

That necessary logistics have been arranged

C.

Whether the OSC can better meet the targeted CMMC Level

D.

That evidence is available and accessible for the targeted CMMC Level

Question 31

What should the Lead Assessor do to BEST ensure the evidence supplied effectively meets the intent of the standard for a practice?

Options:

A.

Ensure the evidence for each objective under a practice is adequate.

B.

Ensure the evidence is sufficient to meet the requirements for a practice.

C.

Ensure the evidence is complete, validated, and can be mapped to the practice requirements.

D.

Ensure the evidence covers all the scope and the identified organizations and corresponds to the practice and objectives.

Question 32

While completing the Level 2 Assessment, the Lead Assessor found that the OSC was deficient on a number of CMMC practices. Forty practices were scored as NOT MET, all on the Authorized Deficiency Corrections list. The OSC remediated 17 of those during closeout, leaving 23 practices still NOT MET. What should the Lead Assessor recommend?

Options:

A.

Pass the OSC but put the 23 remaining on a POA&M

B.

Fail the OSC and require them to remediate and reapply for Level 2 certification

C.

Recommend an interim certification and put the 23 remaining practices on a POA&M

D.

Recommend an interim certification and revisit the failed practices upon certification renewal

Question 33

While conducting a CMMC Level 2 gap analysis with a large defense contractor, a CMMC RP confirms that the organization uses a RADIUS server for authentication. What additional method could be used to comply with AC.L2-3.1.17: Wireless Access Protection?

Options:

A.

Layer 3 switch

B.

Intrusion detection solution

C.

WPA2-Enterprise encryption

D.

Frequency-hopping wireless access

Question 34

The Lead Assessor concludes that the OSC is not ready for the assessment. After the Readiness Assessment Review, the OSC and the Lead Assessor could choose to:

Options:

A.

Replan or cancel the assessment.

B.

Replan or reschedule the assessment.

C.

Proceed as planned or cancel the assessment.

D.

Proceed as planned or reschedule the assessment.

Question 35

An OSC is preparing for assessment. Which item of evidence would show the OSC’s efforts to restrict physical access within the OSC’s environment?

Options:

A.

VPN configuration

B.

Switch configuration files

C.

Network architecture drawings

D.

Documented OSC procedures

Question 36

An OSC seeking Level 2 certification is working with an ESP. The organization is trying to determine if the ESP is considered within the assessment and is reviewing the Service Level Agreement (SLA) between the organization and the ESP. Which SLA component should be taken into consideration to determine if the ESP is within the assessment scope?

Options:

A.

Services

B.

Intervals

C.

Penalties

D.

Measurements

Question 37

FIPS-validated cryptography is required to meet CMMC practices that protect CUI when transmitted or stored outside the OSC’s CMMC enclave. What source does the CCA use to verify that the cryptography the OSC has implemented is FIPS-validated?

Options:

A.

Cryptographic section of the OSC’s SSP

B.

Vendor cryptographic module documentation

C.

NIST Module Validation Program

D.

Cryptographic section of the Shared Responsibility Matrix

Question 38

An OSC has a large multi-building facility. One building is used as the OSC’s data center. A guard is stationed at the entrance to the data center. A vendor engineer comes onsite to perform maintenance on the storage array in the data center. The guard knows the engineer well and has the engineer fill out the visitor log with the contact person’s name and phone number, the reason for the visit, and the date and time. Since the guard has known the engineer for many years, what is the BEST step the guard should take?

Options:

A.

Call the contact person and let her know that the engineer is onsite and give the engineer a temporary badge to enter the data center.

B.

Call the operations center to give the engineer temporary access to enter the data center and escort the engineer to the array and leave.

C.

Call the contact person to have her come down and escort the engineer to the array and stay with the engineer until the maintenance is complete.

D.

Call the operations center to have one of the admins escort the engineer to the array and stay with the engineer until the maintenance is complete.

Question 39

While conducting a CMMC Level 2 Assessment for a small waveguide manufacturer, the client provides a copy of their CMMC Level 1 Self-Assessment that their senior official has recently approved and uploaded to the Supplier Performance Risk System (SPRS). What type of information may be covered within the Level 1 Self-Assessment that is OUTSIDE the scope of a Level 2 assessment?

Options:

A.

CUI in paper format

B.

FCI within the CUI production enclave

C.

FCI data within the description in the contractor self-assessment

D.

Sensitive Compartmented Information (SCI) shredded by an approved vendor

Question 40

During a company’s assessment, the CCA notices that the server room door is kept open with a fan in the entryway because the cooling system is inadequate and the machines are overheating. According to the physical protection policy, the server room’s keypad is the mechanism for managing and controlling access to this equipment, and only the IT team should have access to the server room. However, with the door open, the keypad is not necessary, and anyone can enter the room.

The CCA asks the IT manager how access to this room is protected while the door is open. Which response would allow the company to still meet the physical security requirement?

Options:

A.

“Only employees are allowed in this area.”

B.

“We trust our employees not to enter the room if they are not supposed to.”

C.

“The server is located inside another room that only the IT team has access to.”

D.

“The CEO emailed all employees that the server room door would be kept open but only the IT team should enter.”

Question 41

When a CCA is assessing a control through Examine, what MUST they meet?

Options:

A.

Documents utilized for review must be in their mailed form

B.

Documents must be policy, process, and procedure documents

C.

Training materials reviewed can be in-process as they are for educational purposes

D.

System-level, network, and data flow diagrams must be completed in draft format

Question 42

The client has a Supervisory Control and Data Acquisition (SCADA) system as OT to be evaluated as part of its assessment. In reviewing network architecture and conducting interviews, the assessor determines that a firewall separates the SCADA system from the client’s enterprise network and that CUI is not processed by the SCADA system. Based on this information, what is an appropriate outcome?

Options:

A.

The assessor includes the OT within the assessment

B.

The assessor determines the SCADA system is out-of-scope for the assessment

C.

The assessor includes all systems identified by the client as part of the assessment

D.

The assessor determines that all Specialized Assets are within the scope of the assessment

Question 43

Some OSCs share real estate with other companies. To protect FCI/CUI behind unmanned entrances to buildings, floors, or other areas where FCI/CUI is created, used, stored, or transmitted, which of the following is the BEST method?

Options:

A.

Turnstiles to limit access

B.

Cameras to monitor and record foot traffic

C.

Bold signage with strong language to discourage entry

D.

One-way gates which require proper credentials or intercom authorization to unlock and permit entry

Question 44

While scoping the assessment, the assessor learns that the OSC uses various cloud-based solutions sporadically as part of its normal course of business. The OSC states that most business is conducted on-premises and that only a small amount of business uses the cloud. The OSC thinks the cloud is only used for system backups, but there are isolated exceptions.

Are the data provided sufficient to determine that the OSC limits connection to external information systems?

Options:

A.

No, the OSC stated most of its business is on-premises.

B.

No, the OSC did not fully define the extent external connections are used.

C.

Yes, the OSC confirmed that external connections occur.

D.

Yes, the OSC confirmed that external connections occur for system backups.

Question 45

The assessment team is discussing the pre-assessment scope with an OSC. The OSC would like to limit the scope of the security requirements in environments that contain FCI and/or CUI. In this case, the OSC should:

Options:

A.

Request a single CMMC certification for both activities

B.

Choose to conduct two separate CMMC certification activities

C.

Define an Assessment Scope for those assets that process, store, or transmit FCI

D.

Define a CMMC Self-Assessment Scope for only those assets that process, store, or transmit CUI

Page: 1 / 15
Total 150 questions