Month End Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cyber AB CMMC-CCP Certified CMMC Professional (CCP) Exam Exam Practice Test

Page: 1 / 21
Total 206 questions

Certified CMMC Professional (CCP) Exam Questions and Answers

Question 1

An Assessment Team is reviewing a practice that is documented and being checked monthly. When reviewing the logs, the practice is only being completed quarterly. During the interviews, the team members say they perform the practice monthly but only document quarterly. Is this sufficient to pass the practice?

Options:

A.

No, the work is not being done as stated.

B.

Yes, the practice is being done as documented.

C.

No, all three assessment methods must be met to pass.

D.

Yes. the interview process is enough to pass a practice.

Question 2

What is the BEST document to find the objectives of the assessment of each practice?

Options:

A.

CMMC Glossary

B.

CMMC Appendices

C.

CMMC Assessment Process

D.

CMMC Assessment Guide Levels 1 and 2

Question 3

An OSC has requested a C3PAO to conduct a Level 2 Assessment. The C3PAO has agreed, and the two organizations have collaborated to develop the Assessment Plan. Who agrees to and signs off on the Assessment Plan?

Options:

A.

OSC and Sponsor

B.

OSC and CMMC-AB

C.

Lead Assessor and C3PAO

D.

C3PAO and Assessment Official

Question 4

During Phase 4 of the Assessment process, what MUST the Lead Assessor determine and recommend to the C3PAO concerning the OSC?

Options:

A.

Ability

B.

Eligibility

C.

Capability

D.

Suitability

Question 5

While conducting a CMMC Assessment, a Lead Assessor is given documentation attesting to Level 1 identification and authentication practices by the OSC. The Lead Assessor asks the CCP to review the documentation to determine if identification and authentication controls are met. Which documentation BEST satisfies the requirements of IA.L1-3.5.1: Identify system users. processes acting on behalf of users, and devices?

Options:

A.

Procedures for implementing access control lists

B.

List of unauthorized users that identifies their identities and roles

C.

User names associated with system accounts assigned to those individuals

D.

Physical access policy that states. "All non-employees must wear a special visitor pass or be escorted."

Question 6

During the review of information that was published to a publicly accessible site, an OSC correctly identifies that part of the information posted should have been restricted. Which item did the OSC MOST LIKELY identify?

Options:

A.

FCI

B.

Change of leadership in the organization

C.

Launching of their new business service line

D.

Public releases identifying major deals signed with commercial entities

Question 7

For a CMMC Level 2 certification, which organization maintains a non-disclosure agreement with the OSC?

Options:

A.

NIST

B.

C3PAO

C.

CMMC-AB

D.

OUSD A&S

Question 8

A contractor stores security policies, system configuration files, and audit logs in a centralized file repository for later review. According to CMMC terminology, the file repository is being used to:

Options:

A.

protect CUI.

B.

transmit CUI.

C.

store CUI.

D.

generate CUI

Question 9

An OSC has submitted evidence for an upcoming assessment. The assessor reviews the evidence and determines it is not adequate or sufficient to meet the CMMC practice. What can the assessor do?

Options:

A.

Notify the CMMC-AB.

B.

Cancel the assessment.

C.

Postpone the assessment.

D.

Contact the C3PAO for guidance.

Question 10

The Advanced Level in CMMC will contain Access Control (AC) practices from:

Options:

A.

Level 1

B.

Level 3

C.

Levels 1 and 2

D.

Levels 1, 2, and 3

Question 11

A CMMC Assessment Team arrives at an OSC to begin a CMMC Level 2 Assessment. The team checks in at the front desk and lets the receptionist know that they are here to conduct the assessment. The receptionist is aware that the team is arriving today and points down a hallway where the conference room is. The receptionist tells the Lead Assessor to wait in the conference room. as someone will be there shortly. The receptionist fails to check for credentials and fails to escort the team. The receptionist's actions are in direct violation of which CMMC practice?

Options:

A.

PE.L1-3.10.3: Escort visitors and monitor visitor activity

B.

PE.L1-3.10.5: Control and manage physical access devices

C.

PS.L2-3.9.1; Screen individuals prior to authorizing access to organizational systems containing CUI

D.

PS.L2-3 9.2: Ensure that organizational systems containing CUI are protected during and after personnel actions such as terminations and transfers

Question 12

Which method facilitates understanding by analyzing gathered artifacts as evidence?

Options:

A.

Test

B.

Examine

C.

Behavior

D.

Interview

Question 13

What is the MOST common purpose of assessment procedures?

Options:

A.

Obtain evidence.

B.

Define level of effort.

C.

Determine information flow.

D.

Determine value of hardware and software.

Question 14

Which organization is the governmental authority responsible for identifying and marking CUI?

Options:

A.

NARA

B.

NIST

C.

CMMC-AB

D.

Department of Homeland Security

Question 15

The Assessment Team has completed the assessment and determined the preliminary practice ratings. The preliminary practice ratings must be shared with the OSC prior to being finalized for submission. Based on this information, the assessor should present the preliminary practice ratings:

Options:

A.

During the final Daily Checkpoint

B.

After discussing with the CMMC-AB

C.

Via email after the final Daily Checkpoint

D.

Over the phone after the final Daily Checkpoint

Question 16

A test or demonstration is being performed for the Assessment Team during an assessment. Which environment MUST the OSC perform this test or demonstration?

Options:

A.

Client

B.

Production

C.

Development

D.

Demonstration

Question 17

A server is used to store FCI with a cloud provider long-term. What is the server considered?

Options:

A.

In scope, because the cloud provider will be storing the FCI data

B.

Out of scope, because the cloud provider stores the FCI data long-term

C.

In scope, because the cloud provider is required to be CMMC Level 2 certified

D.

Out of scope, because encryption is always used when the cloud provider stores the FCI data

Question 18

When are contractors required to achieve a CMMC certificate at the Level specified in the solicitation?

Options:

A.

At the time of award

B.

Upon solicitation submission

C.

Thirty days from the award date

D.

Before the due date of submission

Question 19

Exercising due care to ensure the information gathered during the assessment is protected even after the engagement has ended meets which code of conduct requirement?

Options:

A.

Availability

B.

Confidentiality

C.

Information Integrity

D.

Respect for Intellectual Property

Question 20

During an assessment, which phase of the process identifies conflicts of interest?

Options:

A.

Analyze requirements.

B.

Develop assessment plan.

C.

Verify readiness to conduct assessment.

D.

Generate final recommended assessment results.

Question 21

Which term describes assessing the ability of a unit equipped with a system to support its mission while withstanding cyber threat activity representative of an actual adversary?

Options:

A.

Penetration test

B.

Black hat testing

C.

Red cell assessment

D.

Adversarial assessment

Question 22

The Lead Assessor interviews a network security specialist of an OSC. The incident monitoring report for the month shows that no security incidents were reported from OSC's external SOC service provider. This is provided as evidence for RA.L2-3.11.2: Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified. Based on this information, the Lead Assessor should conclude that the evidence is:

Options:

A.

inadequate because it is irrelevant to the practice.

B.

adequate because it fits well for expected artifacts.

C.

adequate because no security incidents were reported.

D.

inadequate because the OSC's service provider should be interviewed.

Question 23

Which standard and regulation requirements are the CMMC Model 2.0 based on?

Options:

A.

NIST SP 800-171 and NIST SP 800-172

B.

DFARS, FIPS 100, and NIST SP 800-171

C.

DFARS, NIST, and Carnegie Mellon University

D.

DFARS, FIPS 100, NIST SP 800-171, and Carnegie Mellon University

Question 24

In many organizations, the protection of FCI includes devices that are used to scan physical documentation into digital form and print physical copies of digital FCI. What technical control can be used to limit multi-function device (MFD) access to only the systems authorized to access the MFD?

Options:

A.

Virtual LAN restrictions

B.

Single administrative account

C.

Documentation showing MFD configuration

D.

Access lists only known to the IT administrator

Question 25

What type of information is NOT intended for public release and is provided by or generated for the government under a contract to develop or deliver a product or service to the government, but not including information provided by the government to the public (such as on public websites) or simple transactional information, such as necessary to process payments?

Options:

A.

CDI

B.

CTI

C.

CUI

D.

FCI

Question 26

Per DoDI 5200.48: Controlled Unclassified Information (CUI), CUI is marked by whom?

Options:

A.

DOD OUSD

B.

Authorized holder

C.

Information Disclosure Official

D.

Presidentially authorized Original Classification Authority

Question 27

There are 15 practices that are NOT MET for an OSC's Level 2 Assessment. All practices are applicable to the OSC. Which determination should be reached?

Options:

A.

The OSC may have 90 days for remediating NOT MET practices.

B.

The OSC is not eligible for an option to remediate NOT MET practices.

C.

The OSC may be eligible for an option to remediate NOT MET practices.

D.

The OSC is not eligible for an option to remediate after the assessment is canceled.

Question 28

During a Level 1 Self-Assessment, a smart thermostat was identified. It is connected to the Internet on the OSC's WiFi network. What type of asset is this?

Options:

A.

FCI Asset

B.

CUI Asset

C.

In-scope Asset

D.

Specialized Asset

Question 29

In the CMMC Model, how many practices are included in Level 2?

Options:

A.

17 practices

B.

72 practices

C.

110 practices

D.

180 practices

Question 30

An employee is the primary system administrator for an OSC. The employee will be a core part of the assessment, as they perform most of the duties in managing and maintaining the systems. What would the employee be BEST categorized as?

Options:

A.

Analyzer

B.

Inspector

C.

Applicable staff

D.

Demonstration staff

Question 31

How many domains does the CMMC Model consist of?

Options:

A.

14 domains

B.

43 domains

C.

72 domains

D.

110 domains

Question 32

Which statement BEST describes an assessor's evidence gathering activities?

Options:

A.

Use interviews for assessing a Level 2 practice.

B.

Test all practices or objectives for a Level 2 practice

C.

Test certain assessment objectives to determine findings.

D.

Use examinations, interviews, and tests to gather sufficient evidence.

Question 33

Which standard of assessment do all C3PAO organizations execute an assessment methodology based on?

Options:

A.

ISO 27001

B.

NISTSP800-53A

C.

CMMC Assessment Process

D.

Government Accountability Office Yellow Book

Question 34

An OSC needs to be assessed on RA.L2-3.11.1: Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI. What is in scope for a Level 2 assessment of RA.L2-3.11.1?

Options:

A.

IT systems

B.

Enterprise systems

C.

CUI Marking processes

D.

Processes, people, physical entities, and IT systems in which CUI processed, stored, or transmitted

Question 35

In the Code of Professional Conduct, what does the practice of Professionalism require?

Options:

A.

Do not copy materials without permission to do so.

B.

Do not make assertions about assessment outcomes.

C.

Refrain from dishonesty in all dealings regarding CMMC.

D.

Ensure the security of all information discovered or received.

Question 36

Contractor scoping requirements for a CMMC Level 2 Assessment to document the asset in an inventory, in the SSP and on the network diagram apply to:

Options:

A.

GUI Assets.

B.

CUI and Security Protection Asset categories.

C.

all asset categories except for the Out-of-scope Assets.

D.

Contractor Risk Managed Assets and Specialized Assets.

Question 37

Which domain has a practice requiring an organization to restrict, disable, or prevent the use of nonessential programs?

Options:

A.

Access Control (AC)

B.

Media Protection (MP)

C.

Asset Management (AM)

D.

Configuration Management (CM)

Question 38

An assessment is being completed at a client site that is not far from the Lead Assessor's home office. The client provides a laptop for the duration of the engagement. During a meeting with the network engineers, the Lead Assessor requests information about the network. They respond that they have a significant number of drawings they can provide via their secure cloud storage service. The Lead Assessor returns to their home office and decides to review the documents. What is the BEST way to retrieve the documents?

Options:

A.

Log into the secure cloud storage service to save copies of the documents on both the work and client laptops.

B.

Log into the client VPN from the client laptop and retrieve the documents from the secure cloud storage service.

C.

Log into the client VPN from the assessor's laptop and retrieve the documents from the secure cloud storage service.

D.

Use their home office workstation to retrieve the documents from the secure cloud storage service and save them to a USB stick.

Question 39

During the assessment process, who is the final interpretation authority for recommended findings?

Options:

A.

C3PAO

B.

CMMC-AB

C.

OSC sponsor

D.

Assessment Team Members

Question 40

An Assessment Team is conducting interviews with team members about their roles and responsibilities. The team member responsible for maintaining the antivirus program knows that it was deployed but has very little knowledge on how it works. Is this adequate for the practice?

Options:

A.

Yes, the antivirus program is available, so it is sufficient.

B.

Yes, antivirus programs are automated to run independently.

C.

No, the team member must know how the antivirus program is deployed and maintained.

D.

No, the team member's interview answers about deployment and maintenance are insufficient.

Question 41

A cyber incident is discovered that affects a covered contractor IS and the CDI residing therein. How long does the contractor have to inform the DoD?

Options:

A.

24 hours

B.

48 hours

C.

72 hours

D.

96 hours

Question 42

The Lead Assessor is presenting the Final Findings Presentation to the OSC. During the presentation, the Assessment Sponsor and OSC staff inform the assessor that they do not agree with the assessment results. Who has the final authority for the assessment results?

Options:

A.

C3PAO

B.

CMMC-AB

C.

Assessment Team

D.

Assessment Sponsor

Question 43

When executing a remediation review, the Lead Assessor should:

Options:

A.

help OSC to complete planned remediation activities.

B.

plan two consecutive remediation reviews for an OSC.

C.

submit a delta assessment remediation package for C3PAO's internal quality review.

D.

validate that practices previously listed on the POA&M have been removed on an updated Risk Assessment.

Question 44

During the planning phase of the Assessment Process. C3PAO staff are reviewing the various entities associated with an OSC that has requested a CMMC Level 2 Assessment. Which term describes the people, processes, and technology external to the HQ Organization that participate in the assessment but will not receive a CMMC Level unless an enterprise Assessment is conducted?

Options:

A.

Host Unit

B.

Organization

C.

Coordinating Unit

D.

Supporting Organization/Unit

Question 45

An assessment is being conducted at a remote client site. For the duration of the assessment, the client has provided a designated hoteling space in their secure facility which consists of a desk with access to a shared printer. After noticing that the desk does not lock, a locked cabinet is requested but the client does not have one available. At the end of the day, the client provides a printout copy of an important network diagram. The diagram is clearly marked and contains CUI. What should be done NEXT to protect the document?

Options:

A.

Take it with them to review in the evening.

B.

Leave it on the desk for review the following day.

C.

Put it in the unlocked desk drawer for review the following morning.

D.

Take a picture with the personal phone before securely shredding it.

Question 46

The evidence needed for each practice and/or process is weighed for:

Options:

A.

Adequacy and sufficiency

B.

Adequacy and thoroughness

C.

Sufficiency and thoroughness

D.

Sufficiency and appropriateness

Question 47

CMMC scoping covers the CUI environment encompassing the systems, applications, and services that focus on where CUI is:

Options:

A.

received and transferred.

B.

stored, processed, and transmitted.

C.

entered, edited, manipulated, printed, and viewed.

D.

located on electronic media, on system component memory, and on paper.

Question 48

An organization's sales representative is tasked with entering FCI data into various fields within a spreadsheet on a company-issued laptop. This laptop is an FCI Asset being used to:

Options:

A.

process and transmit FCI.

B.

process and organize FCI.

C.

store, process, and transmit FCI.

D.

store, process, and organize FCI.

Question 49

Which authority leads the CMMC direction, standards, best practices, and knowledge framework for how to map the controls and processes across different Levels that range from basic cyber hygiene to advanced cyber practices?

Options:

A.

NIST

B.

DoD CIO office

C.

Federal CIO office

D.

Defense Federal Acquisition Regulation Council

Question 50

A client uses an external cloud-based service to store, process, or transmit data that is reasonably believed to qualify as CUI. According to DFARS clause 252.204-7012. what set of established security requirements MUST that cloud provider meet?

Options:

A.

FedRAMP Low

B.

FedRAMP Moderate

C.

FedRAMP High

D.

FedRAMP Secure

Question 51

When a conflict of interest is unavoidable, a CCP should NOT:

Options:

A.

Inform their organization

B.

Take action to minimize its impact

C.

Disclose it to affected stakeholders

D.

Conceal it from the Assessment Team lead

Question 52

Where does the requirement to include a required practice of ensuring that personnel are trained to carry out their assigned information security-related duties and responsibilities FIRST appear?

Options:

A.

Level 1

B.

Level 2

C.

Level 3

D.

All levels

Question 53

An Assessment Team Member is conducting a CMMC Level 2 Assessment for an OSC that is in the process of inspecting Assessment Objects for AC.L1-3.1.1: Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems) to determine the adequacy of evidence provided by the OSC. Which Assessment Method does this activity fall under?

Options:

A.

Test

B.

Observe

C.

Examine

D.

Interview

Question 54

A contractor provides services and data to the DoD. The transactions that occur to handle FCI take place over the contractor's business network, but the work is performed on contractor-owned systems, which must be configured based on government requirements and are used to support a contract. What type of Specialized Asset are these systems?

Options:

A.

loT

B.

Restricted IS

C.

Test equipment

D.

Government property

Question 55

During assessment planning, the OSC recommends a person to interview for a certain practice. The person being interviewed MUST be the person who:

Options:

A.

funds that practice.

B.

audits that practice.

C.

supports, audits, and performs that practice.

D.

implements, performs, or supports that practice.

Question 56

What is the BEST description of the purpose of FAR clause 52 204-21?

Options:

A.

It directs all covered contractors to install the cyber security systems listed in that clause.

B.

It describes all of the safeguards that contractors must take to secure covered contractor IS.

C.

It describes the minimum standard of care that contractors must take to secure covered contractor IS.

D.

It directs covered contractors to obtain CMMC Certification at the level equal to the lowest requirement of their contracts.

Question 57

An assessor is in Phase 3 of the CMMC Assessment Process. The assessor has delivered the final findings, submitted the assessment results package, and provided feedback to the C3PAO and CMMC-AB. What must the assessor still do?

Options:

A.

Determine level recommendation

B.

Archive all assessment artifacts

C.

Determine final practice pass/fail results

D.

Archive or dispose of any assessment artifacts

Question 58

The results package for a Level 2 Assessment is being submitted. What MUST a Final Report. CMMC Assessment Results include?

Options:

A.

Affirmation for each practice or control

B.

Documented rationale for each failed practice

C.

Suggested improvements for each failed practice

D.

Gaps or deltas due to any reciprocity model are recorded as met

Question 59

A CCP is on their first assessment for CMMC Level 2 with an Assessment Team and is reviewing the CMMC Assessment Process to understand their responsibilities. Which method gathers information from the subject matter experts to facilitate understanding and achieve clarification?

Options:

A.

Test

B.

Examine

C.

Interview

D.

Assessment

Question 60

A Lead Assessor is ensuring all actions have been completed to conclude a Level 2 Assessment. The final Assessment Results Package has been properly reviewed and is ready to be uploaded. What other materials is the Lead Assessor responsible for maintaining and protecting?

Options:

A.

Any additional notes and information from the Assessment

B.

A final assessment plan, and a Quality Control report from C3PAO

C.

A final assessment plan, and a letter from the Lead Assessor explaining the process

D.

A final assessment plan, a letter from the Lead Assessor explaining the results, and a Quality Control report from C3PAO

Question 61

A Lead Assessor is performing a CMMC readiness review. The Lead Assessor has already recorded the assessment risk status and the overall assessment feasibility. At MINIMUM, what remaining readiness review criteria should be verified?

Options:

A.

Determine the practice pass/fail results.

B.

Determine the preliminary recommended findings.

C.

Determine the initial model practice ratings and record them.

D.

Determine the logistics. Assessment Team, and the evidence readiness.

Page: 1 / 21
Total 206 questions