Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CMMC-CCA Exam Dumps - Certified CMMC Assessor (CCA) Exam

Go to page:
Question # 17

While scoping the assessment, the assessor learns that the OSC uses various cloud-based solutions sporadically as part of its normal course of business. The OSC states that most business is conducted on-premises and that only a small amount of business uses the cloud. The OSC thinks the cloud is only used for system backups, but there are isolated exceptions.

Are the data provided sufficient to determine that the OSC limits connection to external information systems?

A.

No, the OSC stated most of its business is on-premises.

B.

No, the OSC did not fully define the extent external connections are used.

C.

Yes, the OSC confirmed that external connections occur.

D.

Yes, the OSC confirmed that external connections occur for system backups.

Full Access
Question # 18

A company is seeking Level 2 CMMC certification. During the Limited Practice Deficiency Correction Evaluation, the Lead Assessor is deciding whether the company can be moved to a POA&M Close-Out. What condition will result if a POA&M Close-Out option cannot be utilized?

A.

The assessment will be paused until the OSC can meet all practices.

B.

The Lead Assessor will ask the OSC to justify not meeting all the practices.

C.

The OSC will be granted a provisional status until it can meet all the practices.

D.

The Lead Assessor will not recommend the OSC for CMMC Level 2 certification.

Full Access
Question # 19

The OSC POC has supplied all of the procedures, policies, and plans at the start of the assessment. One of the assessors notes that some of the documents have very recent approval dates, while others have been in place for several years based on the document history.

In order to ensure the review of this evidence is sufficient, what is the BEST step to validate the sufficiency of these documents?

A.

Examine the documents to determine if they are complete.

B.

Examine if the procedure in question replaced another document.

C.

Interview OSC team members who should be using the procedure.

D.

Interview people who hold leadership roles named in the documents.

Full Access
Question # 20

In order to assess whether an OSC meets AC.L2-3.1.5: Least Privilege, what should be examined by the Assessor?

A.

Authentication policy

B.

System configurations for all systems

C.

User access lists that identify privileged users

D.

List of terminated employees over the last three months

Full Access
Question # 21

The Lead Assessor has conducted an assessment for an OSC. The OSC’s practices have been scored and preliminary results validated. Based on this information, what is the NEXT logical step?

A.

Determine CMMC Assessment scope.

B.

Deliver recommended assessment results.

C.

Consider additional evidence and record gaps.

D.

Create, finalize, and record recommended final findings.

Full Access
Question # 22

The Lead Assessor is compiling the assessment results, which must contain the status for each of the applicable practices. Some practices have been placed in the limited practice deficiency correction program. Multiple areas have been reviewed, including HQ, host units, and a specific enclave.

In order to properly report the findings, the Lead Assessor MUST:

A.

Identify items that were moved to the POA&M.

B.

Confirm the final findings are aggregated to the OSC level.

C.

Record the agreements made with the OSC Assessment Official.

D.

Ensure the report includes all of the evidence that has been collected.

Full Access
Question # 23

While conducting a CMMC Level 2 Third-Party Assessment of a small defense contractor, an assessor discovers that the contractor’s Information Security Policy has no documented change records demonstrating executive approval. The IT director states that they will add change records in the future, but that other evidence exists. Which documentation is MOST able to demonstrate persistent and habitual adherence to CMMC requirements?

A.

Handwritten notes from executive committee meetings discussing implementation

B.

Several years’ worth of saved emails from the executive team approving policies and directing adherence

C.

A notarized letter from the previous CEO stating that they approved information security policies annually

D.

Transcribed interviews with new employees discussing their understanding of information security policies

Full Access
Question # 24

An OSC is preparing for an assessment and wants to gather evidence that will be used by the Lead Assessor to determine the scope of the assessment. The OSC currently operates a hybrid network, with part of their infrastructure at their physical location and part of their infrastructure in a cloud environment.

What evidence should the OSC collect that would assist the Lead Assessor in determining cloud and hybrid environment constraints?

A.

Subnetworks list

B.

System inventory

C.

Company-owned hardware list

D.

Cloud Service Provider’s Customer Responsibility Matrix

Full Access
Go to page: