Month End Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Cyber AB CMMC-CCP Dumps

Page: 1 / 21
Total 206 questions

Certified CMMC Professional (CCP) Exam Questions and Answers

Question 1

An assessor is in Phase 3 of the CMMC Assessment Process. The assessor has delivered the final findings, submitted the assessment results package, and provided feedback to the C3PAO and CMMC-AB. What must the assessor still do?

Options:

A.

Determine level recommendation

B.

Archive all assessment artifacts

C.

Determine final practice pass/fail results

D.

Archive or dispose of any assessment artifacts

Question 2

Regarding the Risk Assessment (RA) domain, what should an OSC periodically assess?

Options:

A.

Organizational operations, business assets, and employees

B.

Organizational operations, business processes, and employees

C.

Organizational operations, organizational assets, and individuals

D.

Organizational operations, organizational processes, and individuals

Question 3

Which regulation allows for whistleblowers to sue on behalf of the federal government?

Options:

A.

NISTSP 800-53

B.

NISTSP 800-171

C.

False Claims Act

D.

Code of Professional Conduct

Question 4

A Lead Assessor is preparing to conduct a Readiness Review during Phase 1 of the Assessment Process. How much evidence MUST be gathered for each practice?

Options:

A.

A sufficient amount

B.

At least 2 Assessment Objects

C.

Evidence that is deemed adequate

D.

Evidence to support at least 2 Assessment Methods

Question 5

An Assessment Team is conducting a Level 2 Assessment at the request of an OSC. The team has begun to score practices based on the evidence provided. At a MINIMUM what is required of the Assessment Team to determine if a practice is scored as MET?

Options:

A.

All three types of evidence are documented for every control.

B.

Examine and accept evidence from one of the three evidence types.

C.

Complete one of the following; examine two artifacts, either observe a satisfactory demonstration of one control or receive one affirmation from the OSC personnel.

D.

Complete two of the following: examine one artifact, either observe a satisfactory demonstration of one control or receive one affirmation from the OSC personnel.

Question 6

What is objectivity as it applies to activities with the CMMC-AB?

Options:

A.

Ensuring full disclosure

B.

Reporting results of CMMC services completely

C.

Avoiding the appearance of or actual, conflicts of interest

D.

Demonstrating integrity in the use of materials as described in policy

Question 7

A contractor provides services and data to the DoD. The transactions that occur to handle FCI take place over the contractor's business network, but the work is performed on contractor-owned systems, which must be configured based on government requirements and are used to support a contract. What type of Specialized Asset are these systems?

Options:

A.

loT

B.

Restricted IS

C.

Test equipment

D.

Government property

Question 8

Per DoDI 5200.48: Controlled Unclassified Information (CUI), CUI is marked by whom?

Options:

A.

DOD OUSD

B.

Authorized holder

C.

Information Disclosure Official

D.

Presidentially authorized Original Classification Authority

Question 9

A contractor stores security policies, system configuration files, and audit logs in a centralized file repository for later review. According to CMMC terminology, the file repository is being used to:

Options:

A.

protect CUI.

B.

transmit CUI.

C.

store CUI.

D.

generate CUI

Question 10

Which assessment method compares actual-specified conditions with expected behavior?

Options:

A.

Test

B.

Examine

C.

Compile

D.

Interview

Question 11

Two assessors cannot agree if a certain practice should be rated as MET or NOT MET. Who should they consult to determine the final interpretation?

Options:

A.

C3PAO

B.

CMMC-AB

C.

Lead Assessor

D.

Quality Assurance Assessor

Question 12

When scoping a Level 2 assessment, which document is useful for understanding the process to successfully implement practices required for the various Levels of CMMC?

Options:

A.

NISTSP 800-53

B.

NISTSP 800-88

C.

NISTSP 800-171

D.

NISTSP 800-172

Question 13

Which statement BEST describes an assessor's evidence gathering activities?

Options:

A.

Use interviews for assessing a Level 2 practice.

B.

Test all practices or objectives for a Level 2 practice

C.

Test certain assessment objectives to determine findings.

D.

Use examinations, interviews, and tests to gather sufficient evidence.

Question 14

A CMMC Level 1 Self-Assessment identified an asset in the OSC's facility that does not process, store, or transmit FCI. Which type of asset is this considered?

Options:

A.

FCI Assets

B.

Specialized Assets

C.

Out-of-Scope Assets

D.

Government-Issued Assets

Question 15

An employee is the primary system administrator for an OSC. The employee will be a core part of the assessment, as they perform most of the duties in managing and maintaining the systems. What would the employee be BEST categorized as?

Options:

A.

Analyzer

B.

Inspector

C.

Applicable staff

D.

Demonstration staff

Question 16

Which resource contains authoritative data classifications of CUI?

Options:

A.

NARA

B.

CMMC-AB

C.

DoD Contractors FAQ

D.

OSC's privacy policies

Question 17

An OSC needs to be assessed on RA.L2-3.11.1: Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI. What is in scope for a Level 2 assessment of RA.L2-3.11.1?

Options:

A.

IT systems

B.

Enterprise systems

C.

CUI Marking processes

D.

Processes, people, physical entities, and IT systems in which CUI processed, stored, or transmitted

Question 18

Which assessment method describes the process of reviewing, inspecting, observing, studying, or analyzing assessment objects (i.e., specification, mechanisms, activities)?

Options:

A.

Test

B.

Assess

C.

Examine

D.

Interview

Question 19

An OSC performing a CMMC Level 1 Self-Assessment uses a legacy Windows 95 computer, which is the only system that can run software that the government contract requires. Why can this asset be considered out of scope?

Options:

A.

It handles CUI

B.

It is a restricted IS

C.

It is government property

D.

It is operational technology

Question 20

Ethics is a shared responsibility between:

Options:

A.

DoD and CMMC-AB.

B.

OSC and sponsors.

C.

CMMC-AB and members of the CMMC Ecosystem.

D.

members of the CMMC Ecosystem and Lead Assessors.

Question 21

A C3PAO is near completion of a Level 2 Assessment for an OSC. The CMMC Findings Brief and CMMC Assessment Results documents have been developed. The Final Recommended Assessment Results are being generated. When generating these results, what MUST be included?

Options:

A.

An updated Assessment Plan

B.

Recorded and final updated Daily Checkpoint

C.

Fully executed CMMC Assessment contract between the C3PAO and the OSC

D.

Review documentation for the CMMC Quality Assurance Professional (CQAP)

Question 22

A CCP is part of a CMMC Assessment Team interviewing a subject-matter expert on Access Control (AC) within an OSC. During the interview process, what will the CCP ensure about the information exchanged during the interview?

Options:

A.

Performed in groups for more efficient use of resources

B.

Recorded for inclusion in the Final Recommended Findings report

C.

Confidential and non-attributable so interviewees can speak without fear of reprisal

D.

Mapped to specific CMMC practices to clearly delineate which practice is being evaluated

Question 23

In many organizations, the protection of FCI includes devices that are used to scan physical documentation into digital form and print physical copies of digital FCI. What technical control can be used to limit multi-function device (MFD) access to only the systems authorized to access the MFD?

Options:

A.

Virtual LAN restrictions

B.

Single administrative account

C.

Documentation showing MFD configuration

D.

Access lists only known to the IT administrator

Question 24

Which statement BEST describes the key references a Lead Assessor should refer to and use the:

Options:

A.

DoD adequate security checklist for covered defense information.

B.

CMMC Model Overview as it provides assessment methods and objects.

C.

safeguarding requirements from FAR Clause 52.204-21 for a Level 2 Assessment.

D.

published CMMC Assessment Guide practice descriptions for the desired certification level.

Question 25

SC.L2-3 13.14: Control and monitor the use of VoIP technologies is marked as NOT APPLICABLE for an OSC's assessment. How does this affect the assessment scope?

Options:

A.

Any existing telephone system is in scope even if it is not using VoIP technology.

B.

An error has been made and the Lead Assessor should be contacted to correct the error.

C.

VoIP technology is within scope, and it uses FlPS-validated encryption, so it does not need to be assessed.

D.

VoIP technology is not used within scope boundary, so no assessment procedures are specified for this practice.

Question 26

When scoping the organizational system, the scope of applicability for the cybersecurity CUI practices applies to the components of:

Options:

A.

federal systems that process, store, or transmit CUI.

B.

nonfederal systems that process, store, or transmit CUI.

C.

federal systems that process, store, or transmit CUI. or that provide protection for the system components.

D.

nonfederal systems that process, store, or transmit CUI. or that provide protection for the system components.

Question 27

Which term describes "the protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to. or modification of information"?

Options:

A.

Adopted security

B.

Adaptive security

C.

Adequate security

D.

Advanced security

Question 28

An assessment is being completed at a client site that is not far from the Lead Assessor's home office. The client provides a laptop for the duration of the engagement. During a meeting with the network engineers, the Lead Assessor requests information about the network. They respond that they have a significant number of drawings they can provide via their secure cloud storage service. The Lead Assessor returns to their home office and decides to review the documents. What is the BEST way to retrieve the documents?

Options:

A.

Log into the secure cloud storage service to save copies of the documents on both the work and client laptops.

B.

Log into the client VPN from the client laptop and retrieve the documents from the secure cloud storage service.

C.

Log into the client VPN from the assessor's laptop and retrieve the documents from the secure cloud storage service.

D.

Use their home office workstation to retrieve the documents from the secure cloud storage service and save them to a USB stick.

Question 29

Recording evidence as adequate is defined as the criteria needed to:

Options:

A.

verify, based on an assessment and organizational scope.

B.

verify, based on an assessment and organizational practice.

C.

determine if a given artifact, interview response, demonstration, or test meets the CMMC scope.

D.

determine if a given artifact, interview response, demonstration, or test meets the CMMC practice.

Question 30

During an assessment, the Lead Assessor reviews the evidence for each CMMC in-scope practice that has been reviewed, verified, rated, and discussed with the OSC during the daily reviews. The Assessment Team records the final recommended MET or NOT MET rating and prepares to present the results to the assessment participants during the final review with the OSC and sponsor. As a part of this presentation, which document MUST include the attendee list, time/date, location/meeting link, results from all discussed topics, including any resulting actions, and due dates from the OSC or Assessment Team?

Options:

A.

Final log report

B.

Final CMMC report

C.

Final and recorded OSC CMMC report

D.

Final and recorded Daily Checkpoint log

Question 31

Who is responsible for identifying and verifying Assessment Team Member qualifications?

Options:

A.

C3PAO

B.

CMMC-AB

C.

Lead Assessor

D.

CMMC Marketplace

Question 32

What type of criteria is used to answer the question "Does the Assessment Team have the right evidence?"

Options:

A.

Adequacy criteria

B.

Objectivity criteria

C.

Sufficiency criteria

D.

Subjectivity criteria

Question 33

During a Level 1 Self-Assessment, a smart thermostat was identified. It is connected to the Internet on the OSC's WiFi network. What type of asset is this?

Options:

A.

FCI Asset

B.

CUI Asset

C.

In-scope Asset

D.

Specialized Asset

Question 34

A C3PAO is conducting High Level Scoping for an OSC that requested an assessment Which term describes the people, processes, and technology that will be applied to the contract who are requesting a CMMC Level assessment?

Options:

A.

Host Unit

B.

Branch Office

C.

Coordinating Unit

D.

Supporting Organization/Units

Question 35

The Level 1 practice description in CMMC is Foundational. What is the Level 2 practice description?

Options:

A.

Expert

B.

Advanced

C.

Optimizing

D.

Continuously Improved

Question 36

Which term describes the prevention of damage to. protection of, and restoration of computers and electronic communications systems/services, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation?

Options:

A.

Cybersecurity

B.

Data security

C.

Network security

D.

Information security

Question 37

What is DFARS clause 252.204-7012 required for?

Options:

A.

All DoD solicitations and contracts

B.

Solicitations and contracts that use FAR part 12 procedures

C.

Procurements solely for the acquisition of commercial off-the-shelf

D.

Commercial off-the-shelf sold in the marketplace without modifications

Question 38

A test or demonstration is being performed for the Assessment Team during an assessment. Which environment MUST the OSC perform this test or demonstration?

Options:

A.

Client

B.

Production

C.

Development

D.

Demonstration

Question 39

Which statement is NOT a measure to determine if collected evidence is sufficient?

Options:

A.

Evidence covers the sampled organization

B.

Evidence is not required if the practice is ISO certified

C.

Evidence covers the model scope of the Assessment (Target CMMC Level)

D.

Evidence corresponds to the sampled organization in the evidence collection approach

Question 40

When assessing SI.L1-3.14.2: Provide protection from malicious code at appropriate locations within organizational information systems, evidence shows that all of the OSC's workstations and servers have antivirus software installed for malicious code protection. A centralized console for the antivirus software management is in place and records show that all devices have received the most updated antivirus patterns. What is the BEST determination that the Lead Assessor should reach regarding the evidence?

Options:

A.

It is sufficient, and the audit finding can be rated as MET.

B.

It is insufficient, and the audit finding can be rated NOT MET.

C.

It is sufficient, and the Lead Assessor should seek more evidence.

D.

It is insufficient, and the Lead Assessor should seek more evidence.

Question 41

Within how many days from the Assessment Final Recommended Findings Brief should the Lead Assessor and Assessment Team Members, if necessary, review the accuracy and validity of (he OSC's updated POA&M with any accompanying evidence or scheduled collections?

Options:

A.

90 days

B.

180 days

C.

270 days

D.

360 days

Question 42

Which phase of the CMMC Assessment Process includes developing the assessment plan?

Options:

A.

Phase 1

B.

Phase 2

C.

Phase 3

D.

Phase 4

Question 43

Which example represents a Specialized Asset?

Options:

A.

SOCs

B.

Hosted VPN services

C.

Consultants who provide cybersecurity services

D.

All property owned or leased by the government

Question 44

Two network administrators are working together to determine a network configuration in preparation for CMMC. The administrators find that they disagree on a couple of small items. Which solution is the BEST way to ensure compliance with CMMC?

Options:

A.

Consult with the CEO of the company.

B.

Consult the CMMC Assessment Guides and NIST SP 800-171.

C.

Go with the network administrator's ideas with the least stringent controls.

D.

Go with the network administrator's ideas with the most stringent controls.

Question 45

An OSC receives an email with "CUI//SP-PRVCY//FED Only" in the body of the message Which organization's website should the OSC go to identify what this marking means?

Options:

A.

NARA

B.

CMMC-AB

C.

DoD Contractors FAQ page

D.

DoD 239.7601 Definitions page

Question 46

The director of sales, in a meeting, stated that the sales team received feedback on some emails that were sent, stating that the emails were not marked correctly. Which training should the director of sales refer the sales team to regarding information as to how to mark emails?

Options:

A.

FBI CUI Introduction to Marking

B.

NARA CUI Introduction to Marking

C.

C3PAO CUI Introduction to Marking

D.

CMMC-AB CUI Introduction to Marking

Question 47

A CCP is providing consulting services to a company who is an OSC. The CCP is preparing the OSC for a CMMC Level 2 assessment. The company has asked the CCP who is responsible for determining the CMMC Assessment Scope and who validates its CMMC Assessment Scope. How should the CCP respond?

Options:

A.

"The OSC determines the CMMC Assessment Scope, and the CCP validates the CMMC Assessment Scope."

B.

"The OSC determines the CMMC Assessment Scope, and the C3PAO validates the CMMC Assessment Scope."

C.

"The CMMC Lead Assessor determines the CMMC Assessment Scope, and the OSC validates the CMMC Assessment Scope."

D.

"The CMMC C3PAO determines the CMMC Assessment Scope, and the Lead Assessor validates the CMMC Assessment Scope."

Question 48

What is the primary intent of the verify evidence and record gaps activity?

Options:

A.

Map test and demonstration responses to CMMC practices.

B.

Conduct interviews to test process implementation knowledge.

C.

Determine the one-to-one relationship between a practice and an assessment object.

D.

Identify and describe differences between what the Assessment Team required and the evidence collected.

Question 49

What is the BEST description of the purpose of FAR clause 52 204-21?

Options:

A.

It directs all covered contractors to install the cyber security systems listed in that clause.

B.

It describes all of the safeguards that contractors must take to secure covered contractor IS.

C.

It describes the minimum standard of care that contractors must take to secure covered contractor IS.

D.

It directs covered contractors to obtain CMMC Certification at the level equal to the lowest requirement of their contracts.

Question 50

Which training is a CCI authorized to deliver through an approved CMMC LTP?

Options:

A.

CMMC-AB approved training

B.

DoD DFARS and CMMC-AB approved training

C.

NARA CUI training and CMMC-AB approved training

D.

DoD DFARS, NARA CUI, and CMMC-AB approved training

Question 51

How are the Final Recommended Assessment Findings BEST presented?

Options:

A.

Using the CMMC Findings Brief template

B.

Using a C3PAO-provided template that is preferred by the OSC

C.

Using a C3PAO-branded version of the CMMC Findings Brief template

D.

Using the proprietary template created by the Lead Assessor after approval from the C3PAO

Question 52

Which standard of assessment do all C3PAO organizations execute an assessment methodology based on?

Options:

A.

ISO 27001

B.

NISTSP800-53A

C.

CMMC Assessment Process

D.

Government Accountability Office Yellow Book

Question 53

How does the CMMC define a practice?

Options:

A.

A business transaction

B.

A condition arrived at by experience or exercise

C.

A series of changes taking place in a defined manner

D.

An activity or activities performed to meet defined CMMC objectives

Question 54

The Advanced Level in CMMC will contain Access Control {AC) practices from:

Options:

A.

Level 1.

B.

Level 3.

C.

Levels 1 and 2.

D.

Levels 1,2, and 3.

Question 55

Which domain has a practice requiring an organization to restrict, disable, or prevent the use of nonessential programs?

Options:

A.

Access Control (AC)

B.

Media Protection (MP)

C.

Asset Management (AM)

D.

Configuration Management (CM)

Question 56

When are contractors required to achieve a CMMC certificate at the Level specified in the solicitation?

Options:

A.

At the time of award

B.

Upon solicitation submission

C.

Thirty days from the award date

D.

Before the due date of submission

Question 57

Where can a listing of all federal agencies' CUI indices and categories be found?

Options:

A.

32 CFR Section 2002

B.

Official CUI Registry

C.

Executive Order 13556

D.

Official CMMC Registry

Question 58

Which method facilitates understanding by analyzing gathered artifacts as evidence?

Options:

A.

Test

B.

Examine

C.

Behavior

D.

Interview

Question 59

For a CMMC Level 2 certification, which organization maintains a non-disclosure agreement with the OSC?

Options:

A.

NIST

B.

C3PAO

C.

CMMC-AB

D.

OUSD A&S

Question 60

Exercising due care to ensure the information gathered during the assessment is protected even after the engagement has ended meets which code of conduct requirement?

Options:

A.

Availability

B.

Confidentiality

C.

Information Integrity

D.

Respect for Intellectual Property

Question 61

While conducting a CMMC Assessment, a Lead Assessor is given documentation attesting to Level 1 identification and authentication practices by the OSC. The Lead Assessor asks the CCP to review the documentation to determine if identification and authentication controls are met. Which documentation BEST satisfies the requirements of IA.L1-3.5.1: Identify system users. processes acting on behalf of users, and devices?

Options:

A.

Procedures for implementing access control lists

B.

List of unauthorized users that identifies their identities and roles

C.

User names associated with system accounts assigned to those individuals

D.

Physical access policy that states. "All non-employees must wear a special visitor pass or be escorted."

Page: 1 / 21
Total 206 questions