Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Cyber AB CMMC-CCP Dumps

Page: 1 / 22
Total 221 questions

Certified CMMC Professional (CCP) Exam Questions and Answers

Question 1

In scoping a CMMC Level 1 Self-Assessment, it is determined that an ESP employee has access to FCI. What is the ESP employee considered?

Options:

A.

In scope

B.

Out of scope

C.

OSC point of contact

D.

Assessment Team Member

Question 2

An assessor needs to get the most accurate answers from an OSC's team members. What is the BEST method to ensure that the OSC's team members are able to describe team member responsibilities?

Options:

A.

Interview groups of people to get collective answers.

B.

Understand that testing is more important that interviews.

C.

Ensure confidentiality and non-attribution of team members.

D.

Let team members know the questions prior to the assessment.

Question 3

Per DoDI 5200.48: Controlled Unclassified Information (CUI), CUI is marked by whom?

Options:

A.

DoD OUSD

B.

Authorized holder

C.

Information Disclosure Official

D.

Presidential authorized Original Classification Authority

Question 4

A C3PAO is conducting High Level Scoping for an OSC that requested an assessment Which term describes the people, processes, and technology that will be applied to the contract who are requesting a CMMC Level assessment?

Options:

A.

Host Unit

B.

Branch Office

C.

Coordinating Unit

D.

Supporting Organization/Units

Question 5

Two assessors cannot agree if a certain practice should be rated as MET or NOT MET. Who should they consult to determine the final interpretation?

Options:

A.

C3PAO

B.

CMMC-AB

C.

Lead Assessor

D.

Quality Assurance Assessor

Question 6

Who will verify the adequacy and sufficiency of evidence to determine whether the practices and related components for each in-scope Host Unit. Supporting Organization/Unit, or enclave has been met?

Options:

A.

OSC

B.

Assessment Team

C.

Authorizing official

D.

Assessment official

Question 7

At which CMMC Level do the Security Assessment (CA) practices begin?

Options:

A.

Level 1

B.

Level 2

C.

Level 3

D.

Level 4

Question 8

A CMMC Level 1 Self-Assessment identified an asset in the OSC's facility that does not process, store, or transmit FCI. Which type of asset is this considered?

Options:

A.

FCI Assets

B.

Specialized Assets

C.

Out-of-Scope Assets

D.

Government-Issued Assets

Question 9

In performing scoping, what should the assessor ensure that the scope of the assessment covers?

Options:

A.

All assets documented in the business plan

B.

All assets regardless if they do or do not process, store, or transmit FCI/CUI

C.

All entities, regardless of the line of business, associated with the organization

D.

All assets processing, storing, or transmitting FCI/CUI and security protection assets

Question 10

Two network administrators are working together to determine a network configuration in preparation for CMMC. The administrators find that they disagree on a couple of small items. Which solution is the BEST way to ensure compliance with CMMC?

Options:

A.

Consult with the CEO of the company.

B.

Consult the CMMC Assessment Guides and NIST SP 800-171.

C.

Go with the network administrator's ideas with the least stringent controls.

D.

Go with the network administrator's ideas with the most stringent controls.

Question 11

Where can a listing of all federal agencies' CUI indices and categories be found?

Options:

A.

32 CFR Section 2002

B.

Official CUI Registry

C.

Executive Order 13556

D.

Official CMMC Registry

Question 12

The director of sales, in a meeting, stated that the sales team received feedback on some emails that were sent, stating that the emails were not marked correctly. Which training should the director of sales refer the sales team to regarding information as to how to mark emails?

Options:

A.

FBI CUI Introduction to Marking

B.

NARA CUI Introduction to Marking

C.

C3PAO CUI Introduction to Marking

D.

CMMC-AB CUI Introduction to Marking

Question 13

In many organizations, the protection of FCI includes devices that are used to scan physical documentation into digital form and print physical copies of digital FCI. What technical control can be used to limit multi-function device (MFD) access to only the systems authorized to access the MFD?

Options:

A.

Virtual LAN restrictions

B.

Single administrative account

C.

Documentation showing MFD configuration

D.

Access lists only known to the IT administrator

Question 14

When assessing an OSC for CMMC: the Lead Assessor should use the information from the Discussion and Further Discussion sections in each practice because it:

Options:

A.

is normative for an OSC to follow.

B.

contains examples that an OSC must implement.

C.

is mandatory and aligns with FAR Clause 52.204-21.

D.

provides additional information to facilitate the assessment of the practice.

Question 15

During the planning phase of a CMMC Level 2 Assessment, the Lead Assessor is considering what would constitute the right evidence for each practice. What is the Assessor attempting to verify?

Options:

A.

Adequacy

B.

Sufficiency

C.

Process mapping

D.

Assessment scope

Question 16

The Level 1 practice description in CMMC is Foundational. What is the Level 2 practice description?

Options:

A.

Expert

B.

Advanced

C.

Optimizing

D.

Continuously Improved

Question 17

During a Level 2 Assessment, the OSC has provided an inventory list of all hardware. The list includes servers, workstations, and network devices. Why should this evidence be sufficient for making a scoring determination for AC.L2-3.1.19: Encrypt CUI on mobile devices and mobile computing platforms?

Options:

A.

The inventory list does not specify mobile devices.

B.

The interviewee attested to encrypting all data at rest.

C.

The inventory list does not include Bring Your Own Devices.

D.

The DoD has accepted an alternative safeguarding measure for mobile devices.

Question 18

Which statement BEST describes a LTP?

Options:

A.

Creates DoD-licensed training

B.

Instructs a curriculum approved by CMMC-AB

C.

May market itself as a CMMC-AB Licensed Provider for testing

D.

Delivers training using some CMMC body of knowledge objectives

Question 19

Which statement BEST describes an assessor's evidence gathering activities?

Options:

A.

Use interviews for assessing a Level 2 practice.

B.

Test all practices or objectives for a Level 2 practice

C.

Test certain assessment objectives to determine findings.

D.

Use examinations, interviews, and tests to gather sufficient evidence.

Question 20

What activities are conducted while developing an assessment plan?

Options:

A.

The C3PAO decides the Assessment Team members and notifies the Lead Assessor.

B.

The Lead Assessor and the OSC’s sponsor determine the assessment resources and schedule.

C.

The C3PAO’s project manager is responsible for handling potential conflicts of interest.

D.

The evidence collection approach can be finalized when the Lead Assessor conducts an onsite assessment.

Question 21

Which words summarize categories of data disposal described in the NIST SP 800-88 Revision 1. Guidelines for Media Sanitation?

Options:

A.

Clear, purge, destroy

B.

Clear redact, destroy

C.

Clear, overwrite, purge

D.

Clear, overwrite, destroy

Question 22

Within the CMMC Ecosystem which organization ultimately will manage and oversee the training, testing, authorization, and certification of candidate assessors and instructors?

Options:

A.

DoD OUSD

B.

DIB Collaborative Information Sharing Environment

C.

Committee on National Security Systems Instructions

D.

CMMC Assessors and Instructors Certification Organization

Question 23

The Lead Assessor interviews a network security specialist of an OSC. The incident monitoring report for the month shows that no security incidents were reported from OSC's external SOC service provider. This is provided as evidence for RA.L2-3.11.2: Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified. Based on this information, the Lead Assessor should conclude that the evidence is:

Options:

A.

inadequate because it is irrelevant to the practice.

B.

adequate because it fits well for expected artifacts.

C.

adequate because no security incidents were reported.

D.

inadequate because the OSC's service provider should be interviewed.

Question 24

A contractor stores security policies, system configuration files, and audit logs in a centralized file repository for later review. According to CMMC terminology, the file repository is being used to:

Options:

A.

protect CUI.

B.

transmit CUI.

C.

store CUI.

D.

generate CUI

Question 25

A CCP is on their first assessment for CMMC Level 2 with an Assessment Team and is reviewing the CMMC Assessment Process to understand their responsibilities. Which method gathers information from the subject matter experts to facilitate understanding and achieve clarification?

Options:

A.

Test

B.

Examine

C.

Interview

D.

Assessment

Question 26

An assessor is in Phase 3 of the CMMC Assessment Process. The assessor has delivered the final findings, submitted the assessment results package, and provided feedback to the C3PAO and CMMC-AB. What must the assessor still do?

Options:

A.

Determine level recommendation

B.

Archive all assessment artifacts

C.

Determine final practice pass/fail results

D.

Archive or dispose of any assessment artifacts

Question 27

In accordance with NARA directives and Chapter 33 of Title 44 (Records Management Directive), which types of data MUST have policies and procedures for disposal?

Options:

A.

All recorded digital documents

B.

All digital and recorded paper documents

C.

All digital documents and recorded media

D.

All recorded information, regardless of form or characteristics

Question 28

During a Level 2 Assessment, an OSC provides documentation that attests that they utilize multifactor authentication on nonlocal remote maintenance sessions. The OSC feels that they have met the controls for the Level 2 certification. What additional measures should the OSC perform to fully meet the maintenance requirement?

Options:

A.

Connections for nonlocal maintenance sessions should be terminated when maintenance is complete.

B.

Connections for nonlocal maintenance sessions should be unlimited to ensure maintenance is performed properly

C.

The nonlocal maintenance personnel complain that restrictions slow down their response time and should be removed.

D.

The maintenance policy states multifactor authentication must have at least two factors applied for nonlocal maintenance sessions.

Question 29

A CMMC Assessment Team arrives at an OSC to begin a CMMC Level 2 Assessment. The team checks in at the front desk and lets the receptionist know that they are here to conduct the assessment. The receptionist is aware that the team is arriving today and points down a hallway where the conference room is. The receptionist tells the Lead Assessor to wait in the conference room. as someone will be there shortly. The receptionist fails to check for credentials and fails to escort the team. The receptionist's actions are in direct violation of which CMMC practice?

Options:

A.

PE.L1-3.10.3: Escort visitors and monitor visitor activity

B.

PE.L1-3.10.5: Control and manage physical access devices

C.

PS.L2-3.9.1; Screen individuals prior to authorizing access to organizational systems containing CUI

D.

PS.L2-3 9.2: Ensure that organizational systems containing CUI are protected during and after personnel actions such as terminations and transfers

Question 30

When a conflict of interest is unavoidable, a CCP should NOT:

Options:

A.

Inform their organization

B.

Take action to minimize its impact

C.

Disclose it to affected stakeholders

D.

Conceal it from the Assessment Team lead

Question 31

A Level 2 Assessment of an OSC is winding down and the final results are being prepared to present to the OSC. When should the final results be delivered to the OSC?

Options:

A.

At the end of every day of the assessment

B.

Daily and during a final separately scheduled review

C.

Either at the final Daily Checkpoint, or during a separately scheduled findings and recommendation review

D.

Either after approval from the C3PAO. or during a separately scheduled final recommended findings review

Question 32

Which document specifies the CMMC Level 1 practices that correspond to basic safeguarding requirements?

Options:

A.

NIST SP 800-171

B.

NIST SP 800-171b

C.

48 CFR 52.204-21

D.

DFARS 252.204-7012

Question 33

What is the BEST document to find the objectives of the assessment of each practice?

Options:

A.

CMMC Glossary

B.

CMMC Appendices

C.

CMMC Assessment Process

D.

CMMC Assessment Guide Levels 1 and 2

Question 34

For CMMC Assessments, during Phase 1 of the CMMC Assessment Process, which are responsible for identifying potential conflicts of information?

Options:

A.

C3PAO and OSC

B.

OSC and CMMC-AB

C.

CMMC-AB and C3PAO

D.

Lead Assessor and Assessment Team Members

Question 35

In scoping a CMMC Level 1 Self-Assessment, all of the computers and digital assets that handle FCI are identified. A file cabinet that contains paper FCI is also identified. What can this file cabinet BEST be determined to be?

Options:

A.

In scope, because it is an asset that stores FCI

B.

In scope, because it is part of the same physical location

C.

Out of scope, because they are all only paper documents

D.

Out of scope, because it does not process or transmit FCI

Question 36

According to the Configuration Management (CM) domain, which principle is the basis for defining essential system capabilities?

Options:

A.

Least privilege

B.

Essential concern

C.

Least functionality

D.

Separation of duties

Question 37

An Assessment Team is conducting interviews with team members about their roles and responsibilities. The team member responsible for maintaining the antivirus program knows that it was deployed but has very little knowledge on how it works. Is this adequate for the practice?

Options:

A.

Yes, the antivirus program is available, so it is sufficient.

B.

Yes, antivirus programs are automated to run independently.

C.

No, the team member must know how the antivirus program is deployed and maintained.

D.

No, the team member's interview answers about deployment and maintenance are insufficient.

Question 38

The CMMC Level 2 assessment methods include examination and can include:

Options:

A.

documents, mechanisms, or activities.

B.

specific hardware, software, or firmware safeguards employed within a system.

C.

policies, procedures, security plans, penetration tests, and security requirements.

D.

observation of system backup operations, exercising a contingency plan, and monitoring network traffic.

Question 39

The practices in CMMC Level 2 consist of the security requirements specified in:

Options:

A.

NIST SP 800-53

B.

NIST SP 800-171

C.

48 CFR 52.204-21

D.

DFARS 252.204-7012

Question 40

What is DFARS clause 252.204-7012 required for?

Options:

A.

All DoD solicitations and contracts

B.

Solicitations and contracts that use FAR part 12 procedures

C.

Procurements solely for the acquisition of commercial off-the-shelf

D.

Commercial off-the-shelf sold in the marketplace without modifications

Question 41

Which words summarize categories of data disposal described in the NIST SP 800-88 Revision 1, Guidelines for Media Sanitation?

Options:

A.

Clear, purge, destroy

B.

Clear, redact, destroy

C.

Clear, overwrite, purge

D.

Clear, overwrite, destroy

Question 42

A program manager for a defense contractor saves all FCI data relevant to a contract on a flash drive. Why is the flash drive categorized as an FCI Asset ?

Options:

A.

It is storing FCI.

B.

It is testing FCI.

C.

It is distributing FCI.

D.

It is properly marked as FCI.

Question 43

Which standard and regulation requirements are the CMMC Model 2.0 based on?

Options:

A.

NIST SP 800-171 and NIST SP 800-172

B.

DFARS, FIPS 100, and NIST SP 800-171

C.

DFARS, NIST, and Carnegie Mellon University

D.

DFARS, FIPS 100, NIST SP 800-171, and Carnegie Mellon University

Question 44

During the planning phase of the Assessment Process. C3PAO staff are reviewing the various entities associated with an OSC that has requested a CMMC Level 2 Assessment. Which term describes the people, processes, and technology external to the HQ Organization that participate in the assessment but will not receive a CMMC Level unless an enterprise Assessment is conducted?

Options:

A.

Host Unit

B.

Organization

C.

Coordinating Unit

D.

Supporting Organization/Unit

Question 45

The Advanced Level in CMMC will contain Access Control {AC) practices from:

Options:

A.

Level 1.

B.

Level 3.

C.

Levels 1 and 2.

D.

Levels 1,2, and 3.

Question 46

When executing a remediation review, the Lead Assessor should:

Options:

A.

help OSC to complete planned remediation activities.

B.

plan two consecutive remediation reviews for an OSC.

C.

submit a delta assessment remediation package for C3PAO's internal quality review.

D.

validate that practices previously listed on the POA & M have been removed on an updated Risk Assessment.

Question 47

An OSC needs to be assessed on RA.L2-3.11.1: Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI. What is in scope for a Level 2 assessment of RA.L2-3.11.1?

Options:

A.

IT systems

B.

Enterprise systems

C.

CUI Marking processes

D.

Processes, people, physical entities, and IT systems in which CUI processed, stored, or transmitted

Question 48

According to DFARS clause 252.204-7012, who is responsible for determining that Information in a given category should be considered CUI?

Options:

A.

The NARA CUI Executive Agent

B.

The contractor who generated the information

C.

The DoD agency for whom the contractor is performing the work

D.

The military personnel assigned to the contractor for that purpose

Question 49

What are CUI protection responsibilities?

Options:

A.

Shielding

B.

Governing

C.

Correcting

D.

Safeguarding

Question 50

Which NIST SP defines the Assessment Procedure leveraged by the CMMC?

Options:

A.

NIST SP 800-53

B.

NISTSP800-53a

C.

NIST SP 800-171

D.

NISTSP800-171a

Question 51

A C3PAO has completed a Limited Practice Deficiency Correction Evaluation following an assessment of an OSC. The Lead Assessor has recommended moving deficiencies to a POA & M. but the OSC will remain on an Interim Certification. What is the MINIMUM number of practices that must be scored as MET to initiate this course of action?

Options:

A.

80 practices

B.

88 practices

C.

100 practices

D.

110 practices

Question 52

Which regulation allows for whistleblowers to sue on behalf of the federal government?

Options:

A.

NISTSP 800-53

B.

NISTSP 800-171

C.

False Claims Act

D.

Code of Professional Conduct

Question 53

On a Level 2 Assessment Team, what are the roles of the CCP and the CCA?

Options:

A.

The CCP leads the Level 2 Assessment Team, which consists of one or more CCAs.

B.

The CCA leads the Level 2 Assessment Team, which can include 3 CCP with US Citizenship.

C.

The CCA leads the Level 2 Assessment Team, which can include a CCP regardless of citizenship.

D.

The CCP leads the Level 2 Assessment Team, which can include a CCA. regardless of citizenship.

Question 54

Which method facilitates understanding by analyzing gathered artifacts as evidence?

Options:

A.

Test

B.

Examine

C.

Behavior

D.

Interview

Question 55

When assessing SI.L1-3.14.2: Provide protection from malicious code at appropriate locations within organizational information systems, evidence shows that all of the OSC's workstations and servers have antivirus software installed for malicious code protection. A centralized console for the antivirus software management is in place and records show that all devices have received the most updated antivirus patterns. What is the BEST determination that the Lead Assessor should reach regarding the evidence?

Options:

A.

It is sufficient, and the audit finding can be rated as MET.

B.

It is insufficient, and the audit finding can be rated NOT MET.

C.

It is sufficient, and the Lead Assessor should seek more evidence.

D.

It is insufficient, and the Lead Assessor should seek more evidence.

Question 56

A C3PAO is near completion of a Level 2 Assessment for an OSC. The CMMC Findings Brief and CMMC Assessment Results documents have been developed. The Final Recommended Assessment Results are being generated. When generating these results, what MUST be included?

Options:

A.

An updated Assessment Plan

B.

Recorded and final updated Daily Checkpoint

C.

Fully executed CMMC Assessment contract between the C3PAO and the OSC

D.

Review documentation for the CMMC Quality Assurance Professional (CQAP)

Question 57

How are the Final Recommended Assessment Findings BEST presented?

Options:

A.

Using the CMMC Findings Brief template

B.

Using a C3PAO-provided template that is preferred by the OSC

C.

Using a C3PAO-branded version of the CMMC Findings Brief template

D.

Using the proprietary template created by the Lead Assessor after approval from the C3PAO

Question 58

Which term describes the prevention of damage to. protection of, and restoration of computers and electronic communications systems/services, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation?

Options:

A.

Cybersecurity

B.

Data security

C.

Network security

D.

Information security

Question 59

When planning an assessment, the Lead Assessor should work with the OSC to select personnel to be interviewed who could:

Options:

A.

have a security clearance.

B.

be a senior person in the company.

C.

demonstrate expertise on the CMMC requirements.

D.

provide clarity and understanding of their practice activities.

Question 60

The Assessment Team has completed the assessment and determined the preliminary practice ratings. The preliminary practice ratings must be shared with the OSC prior to being finalized for submission. Based on this information, the assessor should present the preliminary practice ratings:

Options:

A.

During the final Daily Checkpoint

B.

After discussing with the CMMC-AB

C.

Via email after the final Daily Checkpoint

D.

Over the phone after the final Daily Checkpoint

Question 61

SI.L2-3.14.7: Identify unauthorized use of organizational systems is being assessed using two assessment objectives. The assessment objectives are to determine if authorized use of the system is defined and to determine if unauthorized use of the system is identified. What is the BEST evidence for this practice?

Options:

A.

Risk response

B.

Risk assessment

C.

Incident response

D.

System monitoring

Question 62

What technical means can an OSC have in place to limit individuals who are authorized to post or process information on publicly accessible systems?

Options:

A.

Enable cookies to track who has accessed certain websites.

B.

Ensure procedural documentation is in place on how to access website consoles.

C.

Ensure marketing team trainings are required so that any changes to the website go through proper review.

D.

Enable administrative access roles to those that need them so that only those people can post items to the website.

Question 63

A Lead Assessor is planning an assessment and scheduling the test activities. Who MUST perform tests to obtain evidence?

Options:

A.

OSC personnel who normally perform that work as the CCP observes

B.

Military personnel and the CCP and/or Lead Assessor to test the adequacy of the written procedure(s)

C.

Military personnel assigned to the contractor for that contract to ensure the confidentiality of the CUI

D.

OSC personnel who do not ordinarily perform that work to evaluate the accuracy of the written procedure(s)

Question 64

An assessment is being completed at a client site that is not far from the Lead Assessor's home office. The client provides a laptop for the duration of the engagement. During a meeting with the network engineers, the Lead Assessor requests information about the network. They respond that they have a significant number of drawings they can provide via their secure cloud storage service. The Lead Assessor returns to their home office and decides to review the documents. What is the BEST way to retrieve the documents?

Options:

A.

Log into the secure cloud storage service to save copies of the documents on both the work and client laptops.

B.

Log into the client VPN from the client laptop and retrieve the documents from the secure cloud storage service.

C.

Log into the client VPN from the assessor's laptop and retrieve the documents from the secure cloud storage service.

D.

Use their home office workstation to retrieve the documents from the secure cloud storage service and save them to a USB stick.

Question 65

The Lead Assessor is presenting the Final Findings Presentation to the OSC. During the presentation, the Assessment Sponsor and OSC staff inform the assessor that they do not agree with the assessment results. Who has the final authority for the assessment results?

Options:

A.

C3PAO

B.

CMMC-AB

C.

Assessment Team

D.

Assessment Sponsor

Question 66

Which are guiding principles in the CMMC Code of Professional Conduct?

Options:

A.

Objectivity, information integrity, and higher accountability

B.

Objectivity, information integrity, and proper use of methods

C.

Proper use of methods, higher accountability, and objectivity

D.

Proper use of methods, higher accountability, and information integrity

Page: 1 / 22
Total 221 questions