Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CMMC-CCP Exam Dumps - Certified CMMC Professional (CCP) Exam

Go to page:
Question # 9

When planning an assessment, the Lead Assessor should work with the OSC to select personnel to be interviewed who could:

A.

have a security clearance.

B.

be a senior person in the company.

C.

demonstrate expertise on the CMMC requirements.

D.

provide clarity and understanding of their practice activities.

Full Access
Question # 10

Which document is the BEST source for determining the sources of evidence for a given practice?

A.

NISTSP 800-53

B.

NISTSP 800-53A

C.

CMMC Assessment Scope

D.

CMMC Assessment Guide

Full Access
Question # 11

Which code or clause requires that a contractor is meeting the basic safeguarding requirements for FCI during a Level 1 Self-Assessment?

A.

FAR 52.204-21

B.

22CFR 120-130

C.

DFARS 252.204-7011

D.

DFARS 252.204-7021

Full Access
Question # 12

A CCP is part of a CMMC Assessment Team interviewing a subject-matter expert on Access Control (AC) within an OSC. During the interview process, what will the CCP ensure about the information exchanged during the interview?

A.

Performed in groups for more efficient use of resources

B.

Recorded for inclusion in the Final Recommended Findings report

C.

Confidential and non-attributable so interviewees can speak without fear of reprisal

D.

Mapped to specific CMMC practices to clearly delineate which practice is being evaluated

Full Access
Question # 13

A CMMC Assessment is being conducted at an OSC's HQ. which is a shared workspace in a multi-tenant building. The OSC is renting four offices on the first floor that can be locked individually. The first-floor conference room is shared with other tenants but has been reserved to conduct the assessment. The conference room has a desk with a drawer that does not lock. At the end of the day, an evidence file that had been sent by email is reviewed. What is the BEST way to handle this file?

A.

Review it. print it, and put it in the desk drawer.

B.

Review it, and make notes on the computer provided by the client.

C.

Review it, print it, make notes, and then shred it in cross-cut shredder in the print room.

D.

Review it. print it, and leave it in a folder on the table together with the other documents.

Full Access
Question # 14

An OSC performing a CMMC Level 1 Self-Assessment uses a legacy Windows 95 computer, which is the only system that can run software that the government contract requires. Why can this asset be considered out of scope?

A.

It handles CUI

B.

It is a restricted IS

C.

It is government property

D.

It is operational technology

Full Access
Question # 15

When assessing SI.L2-3.14.6: Monitor communications for attack, the CCA interviews the person responsible for the intrusion detection system and examines relevant policies and procedures for monitoring organizational systems. What would be a possible next step the CCA could conduct to gather sufficient evidence?

A.

Conduct a penetration test

B.

Interview the intrusion detection system's supplier.

C.

Upload known malicious code and observe the system response.

D.

Review an artifact to check key references for the configuration of the IDS or IPS practice for additional guidance on intrusion detection and prevention systems.

Full Access
Question # 16

What type of information is NOT intended for public release and is provided by or generated for the government under a contract to develop or deliver a product or service to the government, but not including information provided by the government to the public (such as on public websites) or simple transactional information, such as necessary to process payments?

A.

CDI

B.

CTI

C.

CUI

D.

FCI

Full Access
Go to page: