Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CMMC-CCA Certified CMMC Assessor (CCA) Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CMMC-CCA Practice Questions

Certified CMMC Assessor (CCA) Exam

Last Update 3 days ago
Total Questions : 150

Dive into our fully updated and stable CMMC-CCA practice test platform, featuring all the latest CMMC exam questions added this week. Our preparation tool is more than just a Cyber AB study aid; it's a strategic advantage.

Our free CMMC practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CMMC-CCA. Use this test to pinpoint which areas you need to focus your study on.

CMMC-CCA PDF

CMMC-CCA PDF (Printable)
$43.75
$124.99

CMMC-CCA Testing Engine

CMMC-CCA PDF (Printable)
$50.75
$144.99

CMMC-CCA PDF + Testing Engine

CMMC-CCA PDF (Printable)
$63.7
$181.99
Question # 21

A company employs an encrypted VPN to enhance confidentiality over remote connections. The CCA reads a document describing the VPN. It states the VPN allows automated monitoring and control of remote access sessions, helps detect cyberattacks, and supports auditing of remote access to ensure compliance with CMMC requirements.

What document is the CCA MOST LIKELY reviewing to see how these VPNs are controlled and monitored?

Options:

A.  

Access Control Policy

B.  

Media Protection Policy

C.  

Audit and Accountability Policy

D.  

Configuration Management Policy

Discussion 0
Question # 22

Both the SSP and network diagrams presented to the Lead Assessor by the OSC indicate managed service providers (MSPs) within the assessment boundary. In order to BEST understand the impact of the MSPs, what should the Lead Assessor do?

Options:

A.  

Ascertain what employees the MSP has onsite

B.  

Request the customer responsibility matrix related to the MSPs

C.  

Review the inventory to see how the assets have been classified

D.  

Inspect the other initial documents presented including policies and organization charts

Discussion 0
Question # 23

While examining the customer responsibility matrix submitted by the OSC for one of its Cloud Service Providers (CSPs), the Assessor notes that the matrix was substantially completed by the OSC’s RPO. In fact, there is a statement from the RPO that the CSP has met the requirements for FedRAMP MODERAT

E.  

In order to accept that this CSP is qualified to perform some of the practices on behalf of the OSC, what should occur?

Options:

A.  

The CSP must have its service certified for FedRAMP by a certified C3PAO.

B.  

The OSC should provide the contract documents for the CSP specifying that it must meet NIST SP 800-171 practices.

C.  

The OSC must be able to demonstrate that the CSP is providing its services in a manner that complies with CMMC Level 2.

D.  

There must be other evidence that an independent firm has confirmed the security controls meeting FedRAMP MODERATE are in place.

Discussion 0
Question # 24

While conducting a CMMC Level 2 Assessment for a small waveguide manufacturer, the client provides a copy of their CMMC Level 1 Self-Assessment that their senior official has recently approved and uploaded to the Supplier Performance Risk System (SPRS). What type of information may be covered within the Level 1 Self-Assessment that is OUTSIDE the scope of a Level 2 assessment?

Options:

A.  

CUI in paper format

B.  

FCI within the CUI production enclave

C.  

FCI data within the description in the contractor self-assessment

D.  

Sensitive Compartmented Information (SCI) shredded by an approved vendor

Discussion 0
Question # 25

An OSC creates standard user accounts with limited capabilities and administrator accounts with full system access. A standard user initiates the uninstall of the anti-virus software, which is organizationally defined as a privileged function. Which of the following would indicate A

C.  

L2-3.1.7: Privileged Functions is properly implemented?

Options:

A.  

The antivirus software is not uninstalled.

B.  

The antivirus software is successfully uninstalled.

C.  

The antivirus software is not uninstalled, and the attempt is captured in an application audit log.

D.  

The antivirus software is successfully uninstalled, and the event is captured in an application audit log.

Discussion 0
Question # 26

An OSC has built an enclave for its production environment. The enclave sits behind a firewall, with all equipment connected through a switch. There is a shipping workstation and physically connected label printer (used for the sales system, which does not process CUI) that the OSC claims are Contractor Risk Managed Assets (CRMA). Other than showing that the shipping workstation and label printer are not intended to store or transmit CUI, and documenting them in the SSP,

how BEST would the OSC show that the shipping workstation and label printer are Contractor Risk Managed Assets?

Options:

A.  

Document in the asset inventory and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

B.  

Document the shipping workstation and label printer in the asset inventory; show that they are managed using vendor-recommended risk-based security practices; and include them in the network diagram.

C.  

Document the shipping workstation and label printer in the asset inventory; show that they are managed using the organization’s risk-based security policies and procedures; and include them in the network diagram.

D.  

Document the shipping workstation and label printer in the asset inventory; show that they are managed using industry risk-based security best practices; and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

Discussion 0
Question # 27

The Lead Assessor is compiling the assessment results, which must contain the status for each of the applicable practices. Some practices have been placed in the limited practice deficiency correction program. Multiple areas have been reviewed, including HQ, host units, and a specific enclave.

In order to properly report the findings, the Lead Assessor MUST:

Options:

A.  

Identify items that were moved to the POA&M.

B.  

Confirm the final findings are aggregated to the OSC level.

C.  

Record the agreements made with the OSC Assessment Official.

D.  

Ensure the report includes all of the evidence that has been collected.

Discussion 0
Question # 28

An OSC seeking Level 2 certification is reviewing the physical security of their building. Currently, the building manager unlocks and locks the doors for business operations. The OSC would like the ability to automatically unlock the door for authorized personnel, track access individually, and maintain access history for all personnel. The BEST approach is for the OSC to:

Options:

A.  

Maintain a list of authorized personnel and assign them a building key.

B.  

Maintain security cameras to continuously monitor access to the building.

C.  

Install a badge system and require each individual to use their badge to gain entry to the building.

D.  

Install a keypad system and require the entry code to be changed when an individual leaves the company.

Discussion 0
Question # 29

While reviewing C

A.  

L2-3.12.3: Security Control Monitoring, the CCA notices that the assessment period is defined as one year. An OSC's SSP states that under C

A.  

L2-3.12.3, security controls are monitored using the same one-year periodicity to ensure the continued effectiveness of the controls. The assessor understands that some CMMC practices can reference other practices for the entirety of their implementation. Is the OSC’s implementation under C

A.  

L2-3.12.3: Security Control Monitoring acceptable?

Options:

A.  

No, even when referencing other practices more description is always needed.

B.  

No, monitoring must be conducted on an ongoing basis to ensure continued effectiveness.

C.  

Yes, a one-year period for security control monitoring is acceptable.

D.  

Yes, as long as C

A.  

L2-3.12.1 has been scored as MET, they do need to be monitored.

Discussion 0
Question # 30

An OSC uses a colocation facility to house its CUI assets. The colocation restricts access to the data center via keycard and requires all entrants to sign in and out. The OSC’s cage and cabinets are further secured with keys accessible only to OSC-authorized personnel.

In order to assess physical controls, the CCA should:

Options:

A.  

Physically visit the colocation facility to determine the effectiveness of controls.

B.  

Evaluate the colocation facility security process as listed in the service agreement.

C.  

Physically visit the colocation facility to determine the effectiveness of controls and review the OSC’s process for maintaining access to the keys.

D.  

Evaluate the colocation facility security process as listed in the service agreement and review the OSC’s process for maintaining access to the keys.

Discussion 0
Get CMMC-CCA dumps and pass your exam in 24 hours!

Free Exams Sample Questions