Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CMMC-CCA Exam Dumps - Certified CMMC Assessor (CCA) Exam

Go to page:
Question # 9

An OSC processes data in its owned data center. The data center includes a very early smoke detection apparatus (VESDA). The apparatus only captures log information from its sensors around the data center. It is not intended, nor capable of, processing CUI. The VESDA is on a separate VLAN and is in a separate locked room in the data center.

Should the assessor agree that the VESDA is out-of-scope?

A.

Yes. The VESDA is physically and logically separated from the other data center equipment, and it is not intended nor capable of processing CUI.

B.

No. Even though the sensors are out-of-scope, the VESDA could provide access to the outside network if sensors were misused, and CUI could be exfiltrated.

C.

No. Even though the VESDA controller is in a locked room and on a separate VLAN, the VESDA is an essential security function as an early warning system.

D.

Yes. The VESDA serves a non-data processing purpose and is only connected to sensors. Sensors are out-of-scope, so the VESDA is out-of-scope.

Full Access
Question # 10

During the assessment of a company, the CCA learns that 50% of employees work from home using remote access. After reviewing the Access Control policy and audit logs, the CCA is unsure how the system ensures only employees with correct privileges can access CUI. The CCA decides a Test of functionality is required. Which question is of the LEAST concern to the CCA?

A.

Are remote access sessions necessary?

B.

Are remote access sessions permitted?

C.

Are remote access sessions monitored?

D.

Are the types of permitted remote access identified?

Full Access
Question # 11

An OSC seeking Level 2 certification is reviewing the physical security of their building. Currently, the building manager unlocks and locks the doors for business operations. The OSC would like the ability to automatically unlock the door for authorized personnel, track access individually, and maintain access history for all personnel. The BEST approach is for the OSC to:

A.

Maintain a list of authorized personnel and assign them a building key.

B.

Maintain security cameras to continuously monitor access to the building.

C.

Install a badge system and require each individual to use their badge to gain entry to the building.

D.

Install a keypad system and require the entry code to be changed when an individual leaves the company.

Full Access
Question # 12

A company is seeking Level 2 CMMC certification. During the Limited Practice Deficiency Correction Evaluation, the Lead Assessor must decide whether the company can move to a POA&M review. Which condition will result in the Lead Assessor recommending that the OSC’s practice deficiencies move to a POA&M review?

A.

A final score below 88

B.

A final score of 110

C.

A final score of 80 or better

D.

A final score of 88/110 or better

Full Access
Question # 13

A CCA is conducting an interview with an OSC team member about an offering from a well-known Cloud Service Provider (CSP). The offering is known to be secure, but the OSC has not provided evidence and the person being interviewed is unsure how the offering works. Will this offering be accepted by the Assessment Team?

A.

Yes, because of the process of reciprocity

B.

No, the OSC failed to train on the offering

C.

No, because the OSC lacks adequate and sufficient evidence

D.

Yes, because the CSP offering is a well-known, secure offering

Full Access
Question # 14

In an effort to understand whether the OSC appropriately defined the scope to exclude items that should not be assessed, which description does NOT belong in the scope?

A.

Data center in another state used by the OSC

B.

A smoke detector that is connected to the OSC network

C.

The SIEM tool used by the managed service provider in managing the OSC

D.

The office where its managed service provider’s management office is located

Full Access
Question # 15

An OSC seeking Level 2 certification wants to develop and launch a website for customers to purchase items online and submit contact forms. The OSC plans to host the web server in their own data center while also maintaining the security of their internal IT environment. Based on this information, what would be the BEST approach?

A.

Relocate the server to a different office location to protect the OSC’s LAN

B.

Configure a DMZ for an additional layer of security to the OSC’s LAN to host the publicly accessible server

C.

Configure a firewall rule to only allow internal traffic to communicate with the server for an additional layer of security to the OSC’s LAN

D.

Configure the server to protect against object reuse and residual information via shared system resources for an additional layer of security to the OSC’s LAN

Full Access
Question # 16

When assessing an environment, the CCA determines that CUI is contained within an IoT device. Which statement MUST be true?

A.

The IoT device is a Contractor Risk Managed Asset.

B.

The IoT device must be accurately documented within the SSP.

C.

An IoT device may not be utilized to process, store, or transmit CUI.

D.

Access provisioned to the IoT device must be done in accordance with AC.L2-3.1.1: Limit System Access.

Full Access
Go to page: