Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CMMC-CCA Exam Dumps - Certified CMMC Assessor (CCA) Exam

Go to page:
Question # 25

During a CMMC Level 2 Assessment, a CCA interviewed a system administrator on the OSC’s procedures around configuration management and endpoint security. The system administrator described how they build and deploy new systems, and noted that some users require specialized applications for their jobs. Users have been asked to email IT when they install and run an additional application so IT can add it to their list of allowed software.

What must the CCA conclude?

A.

The OSC has properly implemented application deny listing.

B.

The OSC has not properly implemented application allow listing.

C.

IT must deploy an application to report newly installed software.

D.

IT does not have a policy that users notify IT when they install new applications.

Full Access
Question # 26

During an assessment, an assessor is trying to determine if the organization provides protection from malicious code at appropriate locations within organizational information systems. The assessor has decided to use the Interview method to gather evidence. It is BEST to interview:

A.

System developers

B.

System or network administrators

C.

Personnel with audit and accountability responsibilities

D.

Personnel with security alert and advisory responsibilities

Full Access
Question # 27

While reviewing CA.L2-3.12.3: Security Control Monitoring, the CCA notices that the assessment period is defined as one year. An OSC's SSP states that under CA.L2-3.12.3, security controls are monitored using the same one-year periodicity to ensure the continued effectiveness of the controls. The assessor understands that some CMMC practices can reference other practices for the entirety of their implementation. Is the OSC’s implementation under CA.L2-3.12.3: Security Control Monitoring acceptable?

A.

No, even when referencing other practices more description is always needed.

B.

No, monitoring must be conducted on an ongoing basis to ensure continued effectiveness.

C.

Yes, a one-year period for security control monitoring is acceptable.

D.

Yes, as long as CA.L2-3.12.1 has been scored as MET, they do need to be monitored.

Full Access
Question # 28

An OSC seeking Level 2 certification has recently configured system auditing capabilities for all systems within the assessment scope. The audit logs are generated based on the required events and contain the correct content that the organization has defined.

Which of the following BEST describes the next system auditing objective that the organization should define?

A.

Centralized audit log collection

B.

Integration of all system audit logs

C.

Review and update of logged events

D.

Retention requirements for audit records

Full Access
Question # 29

During an assessment, the Lead Assessor determines certain assets to be in-scope which the OSC had considered out-of-scope.

The CCA should reply that for assets to be considered out-of-scope they:

A.

Provide security protections to CUI assets.

B.

Do not provide security protections for CUI assets.

C.

Can, but are not intended to, process, store, or transmit CUI.

D.

Are not required to be physically or logically separated from CUI assets.

Full Access
Question # 30

Testing is one assessment method the Lead Assessor may choose depending on the assessment scope and evidence provided by the OSC. During the Plan Phase, the Lead Assessor and OSC POC agree on who the people are that are involved in a particular practice so that it could be tested if determined appropriate. During the discussion, the OSC POC tells the Lead Assessor that the production system is in use and cannot be stopped for the testing to take place but offers a mirrored system for testing. The Lead Assessor decides:

A.

Only to test the processes conducted by the supporting groups

B.

Only to test the Customer Matrices that are available

C.

Not to perform testing as a mirrored system is not an acceptable substitute for the production system

D.

To ask the OSC for evidence that a mirrored system is exactly the same as the production system to conduct testing

Full Access
Question # 31

An OSC creates standard user accounts with limited capabilities and administrator accounts with full system access. A standard user initiates the uninstall of the anti-virus software, which is organizationally defined as a privileged function. Which of the following would indicate AC.L2-3.1.7: Privileged Functions is properly implemented?

A.

The antivirus software is not uninstalled.

B.

The antivirus software is successfully uninstalled.

C.

The antivirus software is not uninstalled, and the attempt is captured in an application audit log.

D.

The antivirus software is successfully uninstalled, and the event is captured in an application audit log.

Full Access
Question # 32

An OSC has a large multi-building facility. One building is used as the OSC’s data center. A guard is stationed at the entrance to the data center. A vendor engineer comes onsite to perform maintenance on the storage array in the data center. The guard knows the engineer well and has the engineer fill out the visitor log with the contact person’s name and phone number, the reason for the visit, and the date and time. Since the guard has known the engineer for many years, what is the BEST step the guard should take?

A.

Call the contact person and let her know that the engineer is onsite and give the engineer a temporary badge to enter the data center.

B.

Call the operations center to give the engineer temporary access to enter the data center and escort the engineer to the array and leave.

C.

Call the contact person to have her come down and escort the engineer to the array and stay with the engineer until the maintenance is complete.

D.

Call the operations center to have one of the admins escort the engineer to the array and stay with the engineer until the maintenance is complete.

Full Access
Go to page: