Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CMMC-CCA Certified CMMC Assessor (CCA) Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CMMC-CCA Practice Questions

Certified CMMC Assessor (CCA) Exam

Last Update 3 days ago
Total Questions : 150

Dive into our fully updated and stable CMMC-CCA practice test platform, featuring all the latest CMMC exam questions added this week. Our preparation tool is more than just a Cyber AB study aid; it's a strategic advantage.

Our free CMMC practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CMMC-CCA. Use this test to pinpoint which areas you need to focus your study on.

CMMC-CCA PDF

CMMC-CCA PDF (Printable)
$43.75
$124.99

CMMC-CCA Testing Engine

CMMC-CCA PDF (Printable)
$50.75
$144.99

CMMC-CCA PDF + Testing Engine

CMMC-CCA PDF (Printable)
$63.7
$181.99
Question # 11

A midsized professional services organization that frequently contracts with government entities is undergoing a CMMC Level 2 assessment. The CCA interviews IT leadership about their audit logging capabilities and determines that a third-party vendor is responsible for correlating and reviewing audit logs. During the interview, they discuss the process that has been implemented by the vendor to provide a monthly summary of their audit log review to the organization. What issue should the CCA resolve during the interview?

Options:

A.  

The vendor has the ability to provide report generation.

B.  

The vendor may not use the same authoritative time source.

C.  

Audit logs must be reviewed on at least a weekly basis for CMMC requirements.

D.  

Audit logs should not be correlated and reviewed by a third party as they may contain CUI.

Discussion 0
Question # 12

While assessing a company, the CCA is determining whether the company controls and manages connections between its corporate network and all external networks. The company has: (1) a strict employee policy prohibiting personal Internet use and personal email on company computers, and (2) firewalls plus a connection allow-list so only authorized external networks can connect to the company network. Are these safeguards sufficient to meet the applicable CMMC requirement?

Options:

A.  

Yes. The company’s strict employee policy is the best practice for meeting the requirement.

B.  

No. The company must isolate its system from all external connections to meet the requirement.

C.  

Yes. The company’s firewalls and connection allow-lists are appropriate technical controls to meet the requirement.

D.  

No. The company needs full control over all external systems it interfaces with to meet the requirement.

Discussion 0
Question # 13

A company describes its organization as having two systems. One system, System Org, covers the entire organization and allows instant messaging, email, and Internet activity. The other system, System CUI, is used for processing, storing, and transmitting CUI data. System CUI interfaces with System Org through security mechanisms and a firewall.

The CMMC Assessment is being done on System CUI only.

What is the BEST way to describe System CUI?

Options:

A.  

CUI Assets

B.  

In-Scope Assets

C.  

Out-of-Scope Assets

D.  

CUI Assets and Security Protection Assets

Discussion 0
Question # 14

An assessor reviews the OSC’s data protection policy, which requires full disk encryption on company laptops. While interviewing employees, the assessor learns that employees sometimes access data while teleworking on laptops that do not have full disk encryption.

How should the assessor view the implementation of the OSC’s policy?

Options:

A.  

Acceptable because it requires full disk encryption of company laptops.

B.  

Insufficient because there are teleworking instances where the policy is not followed.

C.  

Acceptable as long as an equivalent technical safeguard is implemented for all teleworking scenarios.

D.  

Insufficient because full disk encryption is not required for laptops to comply with CMMC requirements.

Discussion 0
Question # 15

An OSC has an established password policy. The OSC wants to improve its password protection security by implementing a single change. Which of the following is an acceptable element to add to the OSC’s password policy?

Options:

A.  

Require passwords to be changed every 18 months.

B.  

Require passwords to be 5 to 7 characters long.

C.  

Add the use of salted two-way cryptographic hashes of passwords.

D.  

Add the use of salted one-way cryptographic hashes of passwords, where possible.

Discussion 0
Question # 16

The SSP for an OSC undergoing an assessment categorizes a device in the inventory that wirelessly connects to the network. In order to secure the connection of wireless devices that access a system that transmits, stores, or processes CUI, what are the requirements?

Options:

A.  

Wireless access must be configured to use FIPS 140 validated cryptography.

B.  

Wireless users must be vetted, and an Access Control List maintained for access to CUI.

C.  

Wireless access must be configured to use FIPS 140 validated cryptography and limited to authenticated users.

D.  

Wireless users must be specifically identified in network diagrams and configured to use FIPS 140 validated cryptography.

Discussion 0
Question # 17

A CCA is prohibited from doing which of the following?

Options:

A.  

Verifying key internal system boundaries

B.  

Determining if physically separated assets contain CUI

C.  

Ensuring the external system boundary is fully defined

D.  

Examining whether communications are monitored at the external system boundary

Discussion 0
Question # 18

A cloud-native OSC uses a vendor’s FedRAMP MODERATE authorized cloud environment for all aspects of their CUI needs (identity, email, file storage, office suite, etc.) as well as the vendor’s locally installable applications. The OSC properly configured the vendor’s cloud-based SIEM system to monitor all aspects of the cloud environment. The OSC’s SSP documents SI.L2-3.14.7: Identify Unauthorized Use, defining authorized use and referencing procedures for identifying unauthorized use.

How should the Certified Assessor score this practice?

Options:

A.  

NOT MET because logs from physical infrastructure are not captured by the SIEM.

B.  

NOT MET because locally installable applications from a cloud-native environment are not allowed.

C.  

MET because being cloud-native is a great way to contain risk to a vendor’s environment.

D.  

MET because the cloud SIEM is configured to monitor all of the vendor’s cloud environment.

Discussion 0
Question # 19

The OSC’s network consists of a single network switch that connects all devices. This includes the OSC’s OT equipment, which processes CUI. The OT controller requires an unsupported operating system.

What can the Lead Assessor BEST conclude about the overall compliance with M

A.  

L2-3.7.1: Perform Maintenance?

Options:

A.  

It is MET only if every asset that is not a Specialized Asset is maintained.

B.  

It is MET only if the environments are demarcated on the baseline diagram.

C.  

It is NOT MET because industrial equipment should not be processing CUI.

D.  

It is NOT MET because the OSC has not managed the risk of a CUI system being outdated.

Discussion 0
Question # 20

An OSC outsources all of its security incident and event monitoring work to a third-party SO

C.  

Additionally, the OSC utilizes a cloud-hosted antivirus (AV) system to fulfill the requirement of having virus protection without hosting additional servers on-site.

During the scoping discussion, both the SOC and AV should be listed as what type of asset?

Options:

A.  

They are CUI Assets due to their operation within a CUI network.

B.  

They are Out-of-Scope Assets due to being fully hosted/operated by third parties.

C.  

They are Security Protection Assets due to their performance of security functions.

D.  

They are Contractor Risk Managed Assets because they are not physically or logically isolated from CUI assets.

Discussion 0
Get CMMC-CCA dumps and pass your exam in 24 hours!

Free Exams Sample Questions