Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Cyber AB CMMC-CCA Certified CMMC Assessor (CCA) Exam Exam Practice Test

Page: 1 / 15
Total 150 questions

Certified CMMC Assessor (CCA) Exam Questions and Answers

Question 1

While conducting an assessment, an assessor is determining if privileged accounts are used for non-privileged functions. While interviewing a user with a privileged account, the assessor should ask if the person interviewed:

Options:

A.

Knows which other users have privileged accounts

B.

Is knowledgeable of role-based access control privileges

C.

Uses their privileged account to research vulnerabilities on the Internet

D.

Can show how IT staff provision privileged and non-privileged accounts

Question 2

During an assessment, the IT security engineers responsible for password policy for the OSC provided documentation that all passwords are protected using a one-way hashing methodology. As a result, which statement is true?

Options:

A.

Passwords are protected in storage and in transit.

B.

Passwords are transmitted across the network as clear cipher-text.

C.

The password protection allows access but not authorization to assets.

D.

The transformation makes it impossible to re-convert the hashed password.

Question 3

The OSC’s network consists of a single network switch that connects all devices. This includes the OSC’s OT equipment, which processes CUI. The OT controller requires an unsupported operating system.

What can the Lead Assessor BEST conclude about the overall compliance with MA.L2-3.7.1: Perform Maintenance?

Options:

A.

It is MET only if every asset that is not a Specialized Asset is maintained.

B.

It is MET only if the environments are demarcated on the baseline diagram.

C.

It is NOT MET because industrial equipment should not be processing CUI.

D.

It is NOT MET because the OSC has not managed the risk of a CUI system being outdated.

Question 4

A midsized professional services organization that frequently contracts with government entities is undergoing a CMMC Level 2 assessment. The CCA interviews IT leadership about their audit logging capabilities and determines that a third-party vendor is responsible for correlating and reviewing audit logs. During the interview, they discuss the process that has been implemented by the vendor to provide a monthly summary of their audit log review to the organization. What issue should the CCA resolve during the interview?

Options:

A.

The vendor has the ability to provide report generation.

B.

The vendor may not use the same authoritative time source.

C.

Audit logs must be reviewed on at least a weekly basis for CMMC requirements.

D.

Audit logs should not be correlated and reviewed by a third party as they may contain CUI.

Question 5

A company is seeking Level 2 CMMC certification. During the Limited Practice Deficiency Correction Evaluation, the Lead Assessor is deciding whether the company can be moved to a POA&M Close-Out. What condition will result if a POA&M Close-Out option cannot be utilized?

Options:

A.

The assessment will be paused until the OSC can meet all practices.

B.

The Lead Assessor will ask the OSC to justify not meeting all the practices.

C.

The OSC will be granted a provisional status until it can meet all the practices.

D.

The Lead Assessor will not recommend the OSC for CMMC Level 2 certification.

Question 6

An OSC is presenting the CMMC Assessment to the C3PAO along with all supporting documentation. The supporting documents include drawings from a patent application that has not been filed with the patent office and are marked as attorney-client privileged. What document is recommended that the OSC and C3PAO sign?

Options:

A.

Formal contract

B.

Statement of Work

C.

Non-disclosure agreement

D.

Formal disclosure agreement

Question 7

The Lead Assessor has conducted an assessment for an OSC. The OSC’s practices have been scored and preliminary results validated. Based on this information, what is the NEXT logical step?

Options:

A.

Determine CMMC Assessment scope.

B.

Deliver recommended assessment results.

C.

Consider additional evidence and record gaps.

D.

Create, finalize, and record recommended final findings.

Question 8

The Lead Assessor is compiling the assessment results, which must contain the status for each of the applicable practices. Some practices have been placed in the limited practice deficiency correction program. Multiple areas have been reviewed, including HQ, host units, and a specific enclave.

In order to properly report the findings, the Lead Assessor MUST:

Options:

A.

Identify items that were moved to the POA&M.

B.

Confirm the final findings are aggregated to the OSC level.

C.

Record the agreements made with the OSC Assessment Official.

D.

Ensure the report includes all of the evidence that has been collected.

Question 9

What is NOT required for the Lead Assessor to confirm when verifying readiness to conduct an assessment?

Options:

A.

That risks have been identified

B.

That necessary logistics have been arranged

C.

Whether the OSC can better meet the targeted CMMC Level

D.

That evidence is available and accessible for the targeted CMMC Level

Question 10

An assessor is examining an organization’s system maintenance program. While reviewing the system maintenance policy and the OSC’s maintenance records for the CUI network, the assessor notices there is no mention of printers. The assessor asks the IT manager if the company has any printers.

Why is the assessor concerned if the OSC has printers?

Options:

A.

Printers must be completely isolated from all non-CUI assets.

B.

Firmware on a network printer needs to have updates as needed.

C.

Printers cannot be used on a CUI network without government approval.

D.

Printers can produce hard copies of CUI data that need to be safeguarded.

Question 11

A company mirrors its FCI/CUI data storage in a cloud environment. Data is managed across multiple virtual machines (VMs). To satisfy requirements for data security of the LOCAL copy using physical controls, what should the OSC do?

Options:

A.

Use encrypted transport and storage of FCI/CUI data on the VMs.

B.

Store FCI/CUI data without encryption for faster access/backup/restore.

C.

Ensure that the VMs are running on hardware that is physically located in a controlled-access facility.

D.

In addition to a password or personal identification number, use physical means to log in such as a smart card or hard token.

Question 12

While reviewing CA.L2-3.12.3: Security Control Monitoring, the CCA notices that the assessment period is defined as one year. An OSC's SSP states that under CA.L2-3.12.3, security controls are monitored using the same one-year periodicity to ensure the continued effectiveness of the controls. The assessor understands that some CMMC practices can reference other practices for the entirety of their implementation. Is the OSC’s implementation under CA.L2-3.12.3: Security Control Monitoring acceptable?

Options:

A.

No, even when referencing other practices more description is always needed.

B.

No, monitoring must be conducted on an ongoing basis to ensure continued effectiveness.

C.

Yes, a one-year period for security control monitoring is acceptable.

D.

Yes, as long as CA.L2-3.12.1 has been scored as MET, they do need to be monitored.

Question 13

In validating the OSC’s implementation of AC.L2-3.1.16: Wireless Access Authorization, the CCA observes various personal and non-enterprise devices connected to the OSC’s Wi-Fi. Because organizations handle wireless access differently, the CCA must locate evidence showing who has ultimate authority over wireless access. Which authority is acceptable for authorizing wireless access?

Options:

A.

The CEO mandating IT to add their personal phone to the company Wi-Fi

B.

A written policy executed by the CEO listing the pre-authorization requirements for Wi-Fi connectivity

C.

The CEO emailing the company instructing everyone to put personal devices on the company Wi-Fi

D.

A detailed document from the head of IT with instructions on how to connect to the guest Wi-Fi network

Question 14

While examining evidence, a CCA is trying to confirm the claim that the OSC has identified all information system users, processes acting on behalf of users, and all devices.

Which of the following provides the STRONGEST evidence of this practice?

Options:

A.

Lists of system accounts and devices and system audit logs and records

B.

System design documentation and other relevant documents or records

C.

Procedures addressing user and system identification and authentication and SSP

D.

Identification and authentication policy and system configuration settings and associated documentation

Question 15

An OSC has a testing laboratory. The lab has several pieces of equipment, including a workstation that is used to analyze test information collected from the test equipment. All equipment is on the same VLAN that is part of the certification assessment. The OSC claims that the workstation is part of the test equipment (Specialized Asset) and only needs to be addressed under risk-based security policies. However, the OSC states that the data analysis output is CUI. What is the assessor’s BEST response?

Options:

A.

Disagree with the OSC and include the workstation in the full assessment.

B.

Disagree with the OSC and score practice CA.L2-3.12.4: System Security Plan as NOT MET.

C.

Agree with the OSC but perform a limited check of the system, not increasing the assessment cost or duration.

D.

Agree with the OSC and determine if it is managed using the contractor’s risk-based information security procedures and practices.

Question 16

An in-house compliance expert for a large defense contractor is reviewing the organization’s training materials for personnel handling CUI. After a widely publicized insider threat incident, management requires that training address insider threat risks. What is a critical component of insider threat awareness training?

Options:

A.

A bounty system for identifying and stopping insider threats

B.

A company-wide ranking of individuals by insider threat risk

C.

Law enforcement case studies on known insider threat activities

D.

Processes and procedures for reporting suspected insider threat activity

Question 17

An OSC creates standard user accounts with limited capabilities and administrator accounts with full system access. A standard user initiates the uninstall of the anti-virus software, which is organizationally defined as a privileged function. Which of the following would indicate AC.L2-3.1.7: Privileged Functions is properly implemented?

Options:

A.

The antivirus software is not uninstalled.

B.

The antivirus software is successfully uninstalled.

C.

The antivirus software is not uninstalled, and the attempt is captured in an application audit log.

D.

The antivirus software is successfully uninstalled, and the event is captured in an application audit log.

Question 18

During an assessment, the OSC person being interviewed explains the process for escorting visitors. The individual states that while all visitors are escorted, occasionally a vendor may need access to a small room with only one door and limited standing room. In these cases, the escort sits outside the room and observes the vendor completing the work. Is this practice in line with the escort policy?

Options:

A.

No, the escort is not allowed to sit down

B.

No, the escort must always be in the same room

C.

Yes, since the visitor can only use a single entry

D.

Yes, so long as the visitor’s actions can still be viewed by the escort

Question 19

An OSC uses a colocation facility to house its CUI assets. The colocation restricts access to the data center via keycard and requires all entrants to sign in and out. The OSC’s cage and cabinets are further secured with keys accessible only to OSC-authorized personnel.

In order to assess physical controls, the CCA should:

Options:

A.

Physically visit the colocation facility to determine the effectiveness of controls.

B.

Evaluate the colocation facility security process as listed in the service agreement.

C.

Physically visit the colocation facility to determine the effectiveness of controls and review the OSC’s process for maintaining access to the keys.

D.

Evaluate the colocation facility security process as listed in the service agreement and review the OSC’s process for maintaining access to the keys.

Question 20

A manufacturing company is seeking Level 2 certification. The loading docks are currently accessible directly from the company’s main parking lot, which may lead to unauthorized access to facilities. Based on this information, how should this method be modified to BEST meet Level 2 requirements?

Options:

A.

Implement physical perimeter controls, such as turnstiles, to limit access.

B.

Require visitors to check in at the reception desk and maintain a visitor log.

C.

Implement physical perimeter controls, such as cameras, to limit access to only authorized personnel.

D.

Implement physical perimeter controls, such as a gate with a badge system, to limit access to only authorized personnel.

Question 21

During a CMMC Assessment, the assessor is determining if the Escort Visitors practice is MET. Personnel with which of the following responsibilities would be MOST appropriate to interview?

Options:

A.

Repair and facilities maintenance

B.

Local access control and information security

C.

Physical access control and information security

D.

Information technology management and operations

Question 22

The OSC has not implemented cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission, citing the use of alternative physical safeguards.

Which of the following is NOT an alternative physical safeguard in this scenario?

Options:

A.

Trusted couriers

B.

Lockable casings

C.

Physical access site monitoring

D.

Tamper protections technologies

Question 23

The Lead Assessor is conducting an assessment for an OSC. The Lead Assessor has finished collecting and examining evidence from the assessment.

Based on this information, what is the NEXT logical step?

Options:

A.

Develop an assessment plan.

B.

Deliver recommended assessment results.

C.

Generate final recommended assessment results.

D.

Determine and record initial practice scores.

Question 24

An OSC has a large multi-building facility. One building is used as the OSC’s data center. A guard is stationed at the entrance to the data center. A vendor engineer comes onsite to perform maintenance on the storage array in the data center. The guard knows the engineer well and has the engineer fill out the visitor log with the contact person’s name and phone number, the reason for the visit, and the date and time. Since the guard has known the engineer for many years, what is the BEST step the guard should take?

Options:

A.

Call the contact person and let her know that the engineer is onsite and give the engineer a temporary badge to enter the data center.

B.

Call the operations center to give the engineer temporary access to enter the data center and escort the engineer to the array and leave.

C.

Call the contact person to have her come down and escort the engineer to the array and stay with the engineer until the maintenance is complete.

D.

Call the operations center to have one of the admins escort the engineer to the array and stay with the engineer until the maintenance is complete.

Question 25

An OSC has two business locations. At each location, the OSC has a wireless guest network to which non-OSC employees are allowed access. The guest network is not password protected and it connects devices within the local OSC’s LAN. Based on this information, does the OSC meet the requirements of Level 2 for network access restriction?

Options:

A.

No, the OSC needs to go through an additional assessment.

B.

No, the OSC has not met the network access restriction requirements.

C.

Yes, there are no network access restriction requirements.

D.

Yes, the OSC has met the network access restriction requirements.

Question 26

AC.L2-3.1.6: Non-Privileged Account Use is being assessed. Which procedure BEST meets all of the standards for non-privileged account use?

Options:

A.

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for security tasks.

B.

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their non-privileged account for security tasks.

C.

All non-IT employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for all tasks.

D.

All non-IT employees are given a non-privileged user account.

System Administrators are given only an administrator account.

System Administrators use their administrator account for all tasks.

Question 27

A CCA is asked to validate if an OSC has separated their systems containing CUI from other departments’ systems on their local network. Which of the following MUST the CCA assess?

Options:

A.

Area Network (WAN)

B.

Virtual Private Network (VPN)

C.

Virtual Local Area Network (VLAN)

D.

Network Address Translation (NAT)

Question 28

A CCA is prohibited from doing which of the following?

Options:

A.

Verifying key internal system boundaries

B.

Determining if physically separated assets contain CUI

C.

Ensuring the external system boundary is fully defined

D.

Examining whether communications are monitored at the external system boundary

Question 29

A Lead Assessor is preparing to conduct a Level 2 Assessment for an OSC. The assessor already determined the assessment scope and systems included. In addition, the assessor requests:

    Results of the most recent OSC self-assessment or any pre-assessments by an RPO,

    The System Security Plan (SSP), and

    A list of all OSC staff who play a role in in-scope procedures.

Based on this information, which item would the assessor MOST LIKELY request when preparing to conduct a Level 2 Assessment?

Options:

A.

A list of objectives

B.

A manual for each system

C.

A preliminary list of the anticipated evidence

D.

A list of assets that are determined to be out-of-scope

Question 30

When assessing an environment, the CCA determines that CUI is contained within an IoT device. Which statement MUST be true?

Options:

A.

The IoT device is a Contractor Risk Managed Asset.

B.

The IoT device must be accurately documented within the SSP.

C.

An IoT device may not be utilized to process, store, or transmit CUI.

D.

Access provisioned to the IoT device must be done in accordance with AC.L2-3.1.1: Limit System Access.

Question 31

While scoring the evidence for a particular CMMC practice, the Certified Assessor notes that one of the practice objectives is NOT MET, thereby scoring the entire practice as NOT MET. The OSC Assessment Official disagrees with the Certified Assessor’s decision, and they both take the dispute to the Lead Assessor, who is unable to resolve the issue to the OSC’s satisfaction.

How will this dispute be settled?

Options:

A.

The Lead Assessor is the final arbiter of the dispute.

B.

The OSC can supply adequate proof to the Cyber-AB to overturn the decision.

C.

The Certified Assessor is certified and, as such, the decision will stand.

D.

The Lead Assessor will present the dispute to the C3PAO Official, who will make a ruling.

Question 32

The OSC POC has supplied all of the procedures, policies, and plans at the start of the assessment. One of the assessors notes that some of the documents have very recent approval dates, while others have been in place for several years based on the document history.

In order to ensure the review of this evidence is sufficient, what is the BEST step to validate the sufficiency of these documents?

Options:

A.

Examine the documents to determine if they are complete.

B.

Examine if the procedure in question replaced another document.

C.

Interview OSC team members who should be using the procedure.

D.

Interview people who hold leadership roles named in the documents.

Question 33

The audit team is discussing the OSC’s Risk Managed Assets. For these types of assets, the contractor need NOT:

Options:

A.

Provide a network diagram of the assessment scope.

B.

Ensure they are included in the pre-assessment discussion.

C.

Prepare for the assets to be assessed against CMMC practices.

D.

Show how they are being managed using organizational security policies.

Question 34

An OSC has built an enclave for its production environment. The enclave sits behind a firewall, with all equipment connected through a switch. There is a shipping workstation and physically connected label printer (used for the sales system, which does not process CUI) that the OSC claims are Contractor Risk Managed Assets (CRMA). Other than showing that the shipping workstation and label printer are not intended to store or transmit CUI, and documenting them in the SSP,

how BEST would the OSC show that the shipping workstation and label printer are Contractor Risk Managed Assets?

Options:

A.

Document in the asset inventory and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

B.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using vendor-recommended risk-based security practices; and include them in the network diagram.

C.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using the organization’s risk-based security policies and procedures; and include them in the network diagram.

D.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using industry risk-based security best practices; and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

Question 35

The OSC has assembled its documentation relating to how it controls remote access for assessment. The Lead Assessor compared this documentation to the provided topology map and noted several indications of external connections with External Service Providers (ESPs). Which document is MOST LIKELY to show acceptable evidence of the security controls related to the interface between the OSC and the ESP?

Options:

A.

OSC’s access control policy

B.

Interconnection agreement with ESPs

C.

Technical design of the security of the available VPN

D.

Instructions provided to the OSC from the ESP to implement remote access

Question 36

The Lead Assessor concludes that the OSC is not ready for the assessment. After the Readiness Assessment Review, the OSC and the Lead Assessor could choose to:

Options:

A.

Replan or cancel the assessment.

B.

Replan or reschedule the assessment.

C.

Proceed as planned or cancel the assessment.

D.

Proceed as planned or reschedule the assessment.

Question 37

An OSC has an established password policy. The OSC wants to improve its password protection security by implementing a single change. Which of the following is an acceptable element to add to the OSC’s password policy?

Options:

A.

Require passwords to be changed every 18 months.

B.

Require passwords to be 5 to 7 characters long.

C.

Add the use of salted two-way cryptographic hashes of passwords.

D.

Add the use of salted one-way cryptographic hashes of passwords, where possible.

Question 38

During an assessment interview, the interviewee states that anyone can connect to the company Wi-Fi without prior approval. Within which domains is the Wi-Fi configuration covered?

Options:

A.

Media Protection (MP), Access Control (AC), and Physical Protection (PE)

B.

Identification and Authentication (IA), Media Protection (MP), and System and Information Integrity (SI)

C.

Access Control (AC), Identification and Authentication (IA), and System and Communications Protection (SC)

D.

System and Communications Protection (SC), System and Information Integrity (SI), and Physical Protection (PE)

Question 39

A company has four waterjet machines with very limited computing capabilities. The company loads CUI onto these machines for machining parts and uses CUI as necessary for machining.

Should these waterjet machines be part of the CMMC Assessment?

Options:

A.

No, these waterjet machines are Out-of-Scope Assets and do not need to be assessed.

B.

Yes, these waterjet machines are CUI Assets that must be assessed because they handle CUI.

C.

Yes, these waterjet machines are Specialized Assets that are within the scope of a CMMC Assessment.

D.

No, these waterjet machines are Contractor Risk Managed Assets and do not need to be assessed.

Question 40

A company has a server in its own Virtual Cloud used as a CUI enclave. There is a point-to-point VPN between the OSC’s office and the cloud environment. Designated users have direct access to the enclave when in the office. When working remotely, those users must establish a VPN connection between their company laptop and the cloud server.

During the assessment, the CCA asks the IT manager about external connections.

How many external connections are within the boundary for this assessment?

Options:

A.

The system has one external connection through the VPN when working outside the office.

B.

The system has no external connections since the OSC operates the connections and the enclave.

C.

The system has one external connection through the dedicated VPN between the office and the Cloud.

D.

The system has two external connections: one through the user-initiated VPNs and one to the company’s office.

Question 41

An assessor is trying to determine if an OSC performs scans of their information system and real-time scans of files from external sources as files are downloaded or executed.

Which evidence is LEAST LIKELY to help this assessor?

Options:

A.

System configuration settings

B.

System Information and Integrity Policy

C.

Alerts from the anti-virus software

D.

Interviews with personnel with configuration management responsibility

Question 42

While assessing a company, the CCA is determining whether the company controls and manages connections between its corporate network and all external networks. The company has: (1) a strict employee policy prohibiting personal Internet use and personal email on company computers, and (2) firewalls plus a connection allow-list so only authorized external networks can connect to the company network. Are these safeguards sufficient to meet the applicable CMMC requirement?

Options:

A.

Yes. The company’s strict employee policy is the best practice for meeting the requirement.

B.

No. The company must isolate its system from all external connections to meet the requirement.

C.

Yes. The company’s firewalls and connection allow-lists are appropriate technical controls to meet the requirement.

D.

No. The company needs full control over all external systems it interfaces with to meet the requirement.

Question 43

The team is assessing an OSC that uses the cloud for hosting its online services. Which of the following is NOT important for the assessor to consider?

Options:

A.

Devices connecting to the system are authorized.

B.

Processes acting on behalf of a user are authenticated.

C.

Users are authorized as a prerequisite to system access.

D.

FIPS encryption is authenticated as a prerequisite to system access.

Question 44

A C3PAO is conducting a Level 2 assessment of a midsized construction contractor that does both private (commercial) and federal work. The contractor’s documentation states that all CUI flows through a single building on their office campus and is logically, physically, and administratively isolated from the rest of the environment. Why might an assessor request access to assess controls within a building or area not listed as in-scope in the documentation?

Options:

A.

If the assessor sees personnel carrying locked cases into the other building or area

B.

If the OSC has an underground passageway connecting the CUI building to a non-CUI building

C.

If network diagrams indicate the commercial and federal sectors share a single Internet connection

D.

If Human Resources that supports both commercial and federal sectors sits in the other building or area

Question 45

A Lead Assessor is preparing to conduct a Level 2 Assessment for an OSC. During the planning phase, the Lead Assessor and OSC have:

    Developed evidence collection approach;

    Identified the team members, resources, schedules, and logistics;

    Identified and managed conflicts of interest;

    Gained access to the OSC’s relevant documentation.

Based on the information provided, which would be an additional element to be discussed during the planning phase of the assessment?

Options:

A.

Identify and document evidence gaps

B.

Describe the assessment appeals

C.

Estimate a rough order-of-magnitude (ROM) cost for the assessment

D.

Determine FedRAMP MODERATE equivalency for Cloud computing provider

Page: 1 / 15
Total 150 questions