Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CMMC-CCP Exam Dumps - Certified CMMC Professional (CCP) Exam

Searching for workable clues to ace the Cyber AB CMMC-CCP Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CMMC-CCP PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 33

The practices in CMMC Level 2 consist of the security requirements specified in:

A.

NIST SP 800-53

B.

NIST SP 800-171

C.

48 CFR 52.204-21

D.

DFARS 252.204-7012

Full Access
Question # 34

The CMMC Level 2 assessment methods include examination and can include:

A.

documents, mechanisms, or activities.

B.

specific hardware, software, or firmware safeguards employed within a system.

C.

policies, procedures, security plans, penetration tests, and security requirements.

D.

observation of system backup operations, exercising a contingency plan, and monitoring network traffic.

Full Access
Question # 35

Contractor scoping requirements for a CMMC Level 2 Assessment to document the asset in an inventory, in the SSP and on the network diagram apply to:

A.

GUI Assets.

B.

CUI and Security Protection Asset categories.

C.

all asset categories except for the Out-of-scope Assets.

D.

Contractor Risk Managed Assets and Specialized Assets.

Full Access
Question # 36

Which term describes the prevention of damage to. protection of, and restoration of computers and electronic communications systems/services, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation?

A.

Cybersecurity

B.

Data security

C.

Network security

D.

Information security

Full Access
Question # 37

A member of the Assessment Team has been assigned the responsibility of maintaining and protecting information from the OSC. The Assessment Results Package, PCI, CUI, and any notes must be retained and protected from disclosure. To protect the OSC's information, which principle should be used, and for how long?

A.

Cryptography and hashing for 1 year

B.

Confidentiality and non-disclosure for 3 years

C.

Availability, confidentiality, and integrity for 1 year

D.

Authentication, authorization, and accounting for 3 years

Full Access
Question # 38

Which words summarize categories of data disposal described in the NIST SP 800-88 Revision 1. Guidelines for Media Sanitation?

A.

Clear, purge, destroy

B.

Clear redact, destroy

C.

Clear, overwrite, purge

D.

Clear, overwrite, destroy

Full Access
Question # 39

Which statement BEST describes the key references a Lead Assessor should refer to and use the:

A.

DoD adequate security checklist for covered defense information.

B.

CMMC Model Overview as it provides assessment methods and objects.

C.

safeguarding requirements from FAR Clause 52.204-21 for a Level 2 Assessment.

D.

published CMMC Assessment Guide practice descriptions for the desired certification level.

Full Access
Question # 40

During the assessment process, who is the final interpretation authority for recommended findings?

A.

C3PAO

B.

CMMC-AB

C.

OSC sponsor

D.

Assessment Team Members

Full Access
Go to page: