Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CMMC-CCA Exam Dumps - Certified CMMC Assessor (CCA) Exam

Go to page:
Question # 33

Video monitoring is used by an OSC to help meet PE.L2-3.10.2: Monitor Facility. The OSC’s building has three external doors, each with badge access and a network-connected video camera above the door. The video cameras are connected to the same network as employee computers. The OSC contracted a local security company to provide surveillance services. The security company stores the recordings at its premises and requires access to the OSC’s network to manage the video cameras. Which factor is a clear negative finding for the OSC’s assessment?

A.

Video surveillance needs to be of both private and public areas of the building

B.

A non-certified third party accesses the OSC’s network to manage the cameras

C.

Video surveillance alone does not satisfy the facility monitoring requirement of PE.L2-3.10.2

D.

A non-certified third party’s data center may not store video recordings for a company authorized to process CUI

Full Access
Question # 34

An OSC is presenting the CMMC Assessment to the C3PAO along with all supporting documentation. The supporting documents include drawings from a patent application that has not been filed with the patent office and are marked as attorney-client privileged. What document is recommended that the OSC and C3PAO sign?

A.

Formal contract

B.

Statement of Work

C.

Non-disclosure agreement

D.

Formal disclosure agreement

Full Access
Question # 35

A CCA is prohibited from doing which of the following?

A.

Verifying key internal system boundaries

B.

Determining if physically separated assets contain CUI

C.

Ensuring the external system boundary is fully defined

D.

Examining whether communications are monitored at the external system boundary

Full Access
Question # 36

During an assessment, the Assessment Team has identified, according to the SSP and network diagram, that there is a mission system that cannot be altered but that has privileged accounts which should have MFA applied. As it is not possible to deploy a typical type of MFA on the mission system, which of the following constitutes a sufficient second factor?

A.

VPN access to the mission system

B.

User access logs on the mission system

C.

Badge access to the mission system room

D.

Remote access logs on the mission system

Full Access
Question # 37

An OSC has a minimal physical footprint consisting only of network equipment, workstations, and a centralized domain environment. File storage is centralized in a third-party vendor’s FedRAMP Moderate authorized cloud environment, and employees access files using the cloud integration with their workstations. Since CUI is stored in the FedRAMP Moderate authorized environment, the OSC should prepare to have which environment(s) assessed?

A.

Cloud environment only

B.

OSC’s physical network only

C.

Cloud environment and the OSC’s physical network

D.

OSC’s physical network, the cloud environment, and the cloud vendor’s employee network

Full Access
Question # 38

The Lead Assessor is ready to complete planning by developing the assessment schedule. The Lead Assessor and the OSC Assessment Official discuss the Assessment Team members.

What MUST be submitted to the Cyber-AB before the assessment?

A.

Individual travel plans

B.

Non-disclosure agreements

C.

Verified NIST SP 800-171 assessor qualifications

D.

Absence of Conflict of Interest and Confirmation Statement

Full Access
Question # 39

Phase 2 of the CMMC Assessment Process specifies that the Assessment Team shall generate the final recommended assessment results. The status and recommended scores of the implemented CMMC practices are collected throughout the assessment and are reviewed with the OSC during the final daily review.

What are the key sequential subphases that support the generation of final recommended assessment results?

A.

Determine final practice MET/NOT MET/NA results

Create, finalize, and record recommended final findings

Resolve assessment findings disputes

B.

Validate preliminary recommended findings and scores

Resolve assessment findings disputes

Submit, package, and archive assessment documentation

C.

Create, finalize, and record recommended final findings

Execute POA&M review

Resolve assessment findings disputes

D.

Determine final practice MET/NOT MET/NA results

Validate OSC POA&M

Create, finalize, and record recommended final findings

Full Access
Question # 40

While conducting a CMMC Level 2 self-assessment, an organization’s Chief Information Security Officer asks the system administrator for evidence that remote access is routed through fully managed access control points. Which documentation would BEST demonstrate that all remote access is routed through managed access control points?

A.

Network diagram and VPN logs

B.

Access control policy and procedures

C.

SSP and vendor management

D.

Cloud service audit logs and hardware asset inventory

Full Access
Go to page: