Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Cyber AB CMMC CMMC-CCA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CMMC-CCA Premium Access

View all detail and faqs for the CMMC-CCA exam


518 Students Passed

92% Average Score

95% Same Questions
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

The assessor begins the assessment by meeting with the client’s stakeholders and learns that multiple subsidiaries exist. In order to perform a complete assessment, the assessor must review documents from multiple entities as multiple, corresponding Commercial and Government Entity (CAGE) codes were provided. Which of the following entities may receive certification as a result of this?

Options:

A.

HQ organization

B.

HQ organization and Host unit

C.

Host unit and Supporting Organizations/Units

D.

HQ organization, Host unit, and Supporting Organizations/Units

Questions # 2:

An OSC seeking Level 2 certification has a fully cloud-based environment. The assessor must evaluate fulfillment of Level 2 requirements the OSC implements versus those handled by the cloud service provider. Which document would be BEST to identify the Level 2 requirements handled by the OSC’s cloud provider?

Options:

A.

Zero Trust Architecture

B.

Shared Responsibility Matrix

C.

Cloud Security Baseline White Paper

D.

Identity and Access Management (IAM) Plan

Questions # 3:

An OSC outsources all of its security incident and event monitoring work to a third-party SOC. Additionally, the OSC utilizes a cloud-hosted antivirus (AV) system to fulfill the requirement of having virus protection without hosting additional servers on-site.

During the scoping discussion, both the SOC and AV should be listed as what type of asset?

Options:

A.

They are CUI Assets due to their operation within a CUI network.

B.

They are Out-of-Scope Assets due to being fully hosted/operated by third parties.

C.

They are Security Protection Assets due to their performance of security functions.

D.

They are Contractor Risk Managed Assets because they are not physically or logically isolated from CUI assets.

Questions # 4:

While reviewing CA.L2-3.12.3: Security Control Monitoring, the CCA notices that the assessment period is defined as one year. An OSC's SSP states that under CA.L2-3.12.3, security controls are monitored using the same one-year periodicity to ensure the continued effectiveness of the controls. The assessor understands that some CMMC practices can reference other practices for the entirety of their implementation. Is the OSC’s implementation under CA.L2-3.12.3: Security Control Monitoring acceptable?

Options:

A.

No, even when referencing other practices more description is always needed.

B.

No, monitoring must be conducted on an ongoing basis to ensure continued effectiveness.

C.

Yes, a one-year period for security control monitoring is acceptable.

D.

Yes, as long as CA.L2-3.12.1 has been scored as MET, they do need to be monitored.

Questions # 5:

While completing the Level 2 Assessment, the Lead Assessor found that the OSC was deficient on a number of CMMC practices. Forty practices were scored as NOT MET, all on the Authorized Deficiency Corrections list. The OSC remediated 17 of those during closeout, leaving 23 practices still NOT MET. What should the Lead Assessor recommend?

Options:

A.

Pass the OSC but put the 23 remaining on a POA&M

B.

Fail the OSC and require them to remediate and reapply for Level 2 certification

C.

Recommend an interim certification and put the 23 remaining practices on a POA&M

D.

Recommend an interim certification and revisit the failed practices upon certification renewal

Questions # 6:

When a new employee is issued a laptop, only the user’s credentials need to be set up. According to the IT department, the IT manager is the only person who can change laptop setup and user privileges. What documentation should be examined to determine if this is the case?

Options:

A.

System audit logs

B.

Inventory records

C.

Acceptable use policy

D.

Remote access procedures

Questions # 7:

An OSC has an established password policy. The OSC wants to improve its password protection security by implementing a single change. Which of the following is an acceptable element to add to the OSC’s password policy?

Options:

A.

Require passwords to be changed every 18 months.

B.

Require passwords to be 5 to 7 characters long.

C.

Add the use of salted two-way cryptographic hashes of passwords.

D.

Add the use of salted one-way cryptographic hashes of passwords, where possible.

Questions # 8:

Different mechanisms can be used to protect information at rest. Which mechanism is MOST LIKELY to afford protection for information at rest?

Options:

A.

Patching

B.

File share

C.

Secure offline storage

D.

Cryptographic mechanisms

Questions # 9:

During discussions with an OSC, the assessment team learned that many employees often need to work from remote locations and, as a result, are permitted to access the organization’s internal networks from those remote locations. To ensure secure remote access requirements are being met, remote access sessions need NOT be:

Options:

A.

Validated

B.

Identified

C.

Permitted

D.

Controlled

Questions # 10:

The Lead Assessor is ready to complete planning by developing the assessment schedule. The Lead Assessor and the OSC Assessment Official discuss the Assessment Team members.

What MUST be submitted to the Cyber-AB before the assessment?

Options:

A.

Individual travel plans

B.

Non-disclosure agreements

C.

Verified NIST SP 800-171 assessor qualifications

D.

Absence of Conflict of Interest and Confirmation Statement

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.