Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CMMC-CCA Exam Dumps - Certified CMMC Assessor (CCA) Exam

Go to page:
Question # 4

While scoring the evidence for a particular CMMC practice, the Certified Assessor notes that one of the practice objectives is NOT MET, thereby scoring the entire practice as NOT MET. The OSC Assessment Official disagrees with the Certified Assessor’s decision, and they both take the dispute to the Lead Assessor, who is unable to resolve the issue to the OSC’s satisfaction.

How will this dispute be settled?

A.

The Lead Assessor is the final arbiter of the dispute.

B.

The OSC can supply adequate proof to the Cyber-AB to overturn the decision.

C.

The Certified Assessor is certified and, as such, the decision will stand.

D.

The Lead Assessor will present the dispute to the C3PAO Official, who will make a ruling.

Full Access
Question # 5

When a CCA is assessing a control through Examine, what MUST they meet?

A.

Documents utilized for review must be in their mailed form

B.

Documents must be policy, process, and procedure documents

C.

Training materials reviewed can be in-process as they are for educational purposes

D.

System-level, network, and data flow diagrams must be completed in draft format

Full Access
Question # 6

An OSC has built an enclave for its production environment. The enclave sits behind a firewall, with all equipment connected through a switch. There is a shipping workstation and physically connected label printer (used for the sales system, which does not process CUI) that the OSC claims are Contractor Risk Managed Assets (CRMA). Other than showing that the shipping workstation and label printer are not intended to store or transmit CUI, and documenting them in the SSP,

how BEST would the OSC show that the shipping workstation and label printer are Contractor Risk Managed Assets?

A.

Document in the asset inventory and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

B.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using vendor-recommended risk-based security practices; and include them in the network diagram.

C.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using the organization’s risk-based security policies and procedures; and include them in the network diagram.

D.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using industry risk-based security best practices; and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

Full Access
Question # 7

An Assessor is evaluating controls put in place by an OSC to restrict the use of privileged accounts. The Assessor interviews privileged users and confirms that the OSC has both a policy and specific procedures governing the use of privileged accounts for security functions. What else could the Assessor evaluate to validate the assertions made by the interviewed OSC staff?

A.

Examine the system architecture of the OSC to identify privileged accounts

B.

Test the processes for non-privileged accounts to perform privileged functions

C.

Examine the procedure assigning privileged roles to non-privileged functions

D.

Test the processes for privileged accounts with privileged users

Full Access
Question # 8

FIPS-validated cryptography is required to meet CMMC practices that protect CUI when transmitted or stored outside the OSC’s CMMC enclave. What source does the CCA use to verify that the cryptography the OSC has implemented is FIPS-validated?

A.

Cryptographic section of the OSC’s SSP

B.

Vendor cryptographic module documentation

C.

NIST Module Validation Program

D.

Cryptographic section of the Shared Responsibility Matrix

Full Access
Go to page: