Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

CMMC-CCA Sample Questions Answers

Questions 4

During an assessment, the OSC person being interviewed explains the process for escorting visitors. The individual states that while all visitors are escorted, occasionally a vendor may need access to a small room with only one door and limited standing room. In these cases, the escort sits outside the room and observes the vendor completing the work. Is this practice in line with the escort policy?

Options:

A.

No, the escort is not allowed to sit down

B.

No, the escort must always be in the same room

C.

Yes, since the visitor can only use a single entry

D.

Yes, so long as the visitor’s actions can still be viewed by the escort

Buy Now
Questions 5

While onsite conducting a CMMC Level 2 assessment at a small architecture firm that handles DoD construction contracts, the client offers a list of personnel for interviews. To answer questions regarding visitor access controls, which personnel would be MOST appropriate for interviewing?

Options:

A.

System Administrator

B.

Front-desk Receptionist

C.

Administrative Assistant

D.

Senior Architecture Partner

Buy Now
Questions 6

An OSC has a minimal physical footprint consisting only of network equipment, workstations, and a centralized domain environment. File storage is centralized in a third-party vendor’s FedRAMP Moderate authorized cloud environment, and employees access files using the cloud integration with their workstations. Since CUI is stored in the FedRAMP Moderate authorized environment, the OSC should prepare to have which environment(s) assessed?

Options:

A.

Cloud environment only

B.

OSC’s physical network only

C.

Cloud environment and the OSC’s physical network

D.

OSC’s physical network, the cloud environment, and the cloud vendor’s employee network

Buy Now
Questions 7

A company is seeking Level 2 CMMC certification. During the Limited Practice Deficiency Correction Evaluation, the Lead Assessor must decide whether the company can move to a POA&M review. Which condition will result in the Lead Assessor recommending that the OSC’s practice deficiencies move to a POA&M review?

Options:

A.

A final score below 88

B.

A final score of 110

C.

A final score of 80 or better

D.

A final score of 88/110 or better

Buy Now
Questions 8

A Lead Assessor is preparing to conduct a Level 2 Assessment for an OSC. During the planning phase, the Lead Assessor and OSC have:

    Developed evidence collection approach;

    Identified the team members, resources, schedules, and logistics;

    Identified and managed conflicts of interest;

    Gained access to the OSC’s relevant documentation.

Based on the information provided, which would be an additional element to be discussed during the planning phase of the assessment?

Options:

A.

Identify and document evidence gaps

B.

Describe the assessment appeals

C.

Estimate a rough order-of-magnitude (ROM) cost for the assessment

D.

Determine FedRAMP MODERATE equivalency for Cloud computing provider

Buy Now
Questions 9

To meet AC.L2-3.1.5: Least Privilege, the following procedure is established:

    All employees are given a basic (non-privileged) user account.

    System Administrators are given a separate System Administrator account.

    Database Administrators are given a separate Database Administrator account.

Which steps should be added to BEST meet all of the standards for least privilege?

Options:

A.

4. Database Administrators use their Database Administrator accounts to perform privileged functions.

  5. All users use their basic account for non-privileged functions.

B.

4. Database Administrators use their Database Administrator accounts to perform privileged functions.

  5. Non-privileged users use their basic account for non-privileged functions.

C.

4. Database Administrators use the System Administrator accounts to perform privileged functions.

  5. All other users use their basic account for all authorized functions.

D.

4. Database Administrators use the System Administrator accounts to perform privileged functions.

  5. Non-privileged users use their basic account for all authorized functions.

Buy Now
Questions 10

An OSC has a large multi-building facility. One building is used as the OSC’s data center. A guard is stationed at the entrance to the data center. A vendor engineer comes onsite to perform maintenance on the storage array in the data center. The guard knows the engineer well and has the engineer fill out the visitor log with the contact person’s name and phone number, the reason for the visit, and the date and time. Since the guard has known the engineer for many years, what is the BEST step the guard should take?

Options:

A.

Call the contact person and let her know that the engineer is onsite and give the engineer a temporary badge to enter the data center.

B.

Call the operations center to give the engineer temporary access to enter the data center and escort the engineer to the array and leave.

C.

Call the contact person to have her come down and escort the engineer to the array and stay with the engineer until the maintenance is complete.

D.

Call the operations center to have one of the admins escort the engineer to the array and stay with the engineer until the maintenance is complete.

Buy Now
Questions 11

Phase 2 of the CMMC Assessment Process specifies that the Assessment Team shall generate the final recommended assessment results. The status and recommended scores of the implemented CMMC practices are collected throughout the assessment and are reviewed with the OSC during the final daily review.

What are the key sequential subphases that support the generation of final recommended assessment results?

Options:

A.

Determine final practice MET/NOT MET/NA results

Create, finalize, and record recommended final findings

Resolve assessment findings disputes

B.

Validate preliminary recommended findings and scores

Resolve assessment findings disputes

Submit, package, and archive assessment documentation

C.

Create, finalize, and record recommended final findings

Execute POA&M review

Resolve assessment findings disputes

D.

Determine final practice MET/NOT MET/NA results

Validate OSC POA&M

Create, finalize, and record recommended final findings

Buy Now
Questions 12

A CCA is assessing the implementation of SC.L2-3.13.7: Split Tunneling control via the examine method. Which scenario MUST be correct to determine if the practice is MET?

Options:

A.

The CCA tested that VPN mechanisms disallow split tunneling.

B.

The CCA corroborated that split tunneling is disabled with a system or network administrator.

C.

The CCA determined that split tunneling mechanisms have been disabled based on the system hardware, software, and architecture.

D.

The CCA evaluated that split tunneling mechanisms have been disabled based on the mechanisms supporting or restricting non-remote connections.

Buy Now
Questions 13

A company employs an encrypted VPN to enhance confidentiality over remote connections. The CCA reads a document describing the VPN. It states the VPN allows automated monitoring and control of remote access sessions, helps detect cyberattacks, and supports auditing of remote access to ensure compliance with CMMC requirements.

What document is the CCA MOST LIKELY reviewing to see how these VPNs are controlled and monitored?

Options:

A.

Access Control Policy

B.

Media Protection Policy

C.

Audit and Accountability Policy

D.

Configuration Management Policy

Buy Now
Questions 14

A Lead Assessor is conducting an assessment for an OSC. The Lead Assessor is collecting evidence regarding the OSC’s network separation techniques. Which technique would be considered a logical separation technique and would fall within the scope of the assessment?

Options:

A.

Data loss alerting configured at the edge of the network containing CUI assets

B.

Access limitation based on badge access assigned to employees based on role

C.

Role-based access control within a properly implemented identity and access management tool

D.

A proxy-configured firewall that prevents data from flowing along the physical connection path

Buy Now
Questions 15

What should the Lead Assessor do to BEST ensure the evidence supplied effectively meets the intent of the standard for a practice?

Options:

A.

Ensure the evidence for each objective under a practice is adequate.

B.

Ensure the evidence is sufficient to meet the requirements for a practice.

C.

Ensure the evidence is complete, validated, and can be mapped to the practice requirements.

D.

Ensure the evidence covers all the scope and the identified organizations and corresponds to the practice and objectives.

Buy Now
Questions 16

While examining the customer responsibility matrix submitted by the OSC for one of its Cloud Service Providers (CSPs), the Assessor notes that the matrix was substantially completed by the OSC’s RPO. In fact, there is a statement from the RPO that the CSP has met the requirements for FedRAMP MODERATE.

In order to accept that this CSP is qualified to perform some of the practices on behalf of the OSC, what should occur?

Options:

A.

The CSP must have its service certified for FedRAMP by a certified C3PAO.

B.

The OSC should provide the contract documents for the CSP specifying that it must meet NIST SP 800-171 practices.

C.

The OSC must be able to demonstrate that the CSP is providing its services in a manner that complies with CMMC Level 2.

D.

There must be other evidence that an independent firm has confirmed the security controls meeting FedRAMP MODERATE are in place.

Buy Now
Questions 17

FIPS-validated cryptography is required to meet CMMC practices that protect CUI when transmitted or stored outside the OSC’s CMMC enclave. What source does the CCA use to verify that the cryptography the OSC has implemented is FIPS-validated?

Options:

A.

Cryptographic section of the OSC’s SSP

B.

Vendor cryptographic module documentation

C.

NIST Module Validation Program

D.

Cryptographic section of the Shared Responsibility Matrix

Buy Now
Questions 18

When preparing for an assessment, the assessor determines that the client’s proprietary data resides within an enclave. However, the assessor is unable to review policies containing proprietary data onsite and plans to have the policies copied on removable media by the client’s IT staff, whom they are scheduled to interview. What should the assessor consider as part of their planning?

Options:

A.

No proprietary data can leave the client’s environment under any circumstances.

B.

The assessor can transmit data outside the client’s environment if the client’s IT support staff grants access.

C.

No proprietary data can leave the client’s environment without the express written consent of the OSC POC.

D.

No proprietary data can leave the client’s environment without the express written consent of the OSC Assessment Official.

Buy Now
Questions 19

A company has a server in its own Virtual Cloud used as a CUI enclave. There is a point-to-point VPN between the OSC’s office and the cloud environment. Designated users have direct access to the enclave when in the office. When working remotely, those users must establish a VPN connection between their company laptop and the cloud server.

During the assessment, the CCA asks the IT manager about external connections.

How many external connections are within the boundary for this assessment?

Options:

A.

The system has one external connection through the VPN when working outside the office.

B.

The system has no external connections since the OSC operates the connections and the enclave.

C.

The system has one external connection through the dedicated VPN between the office and the Cloud.

D.

The system has two external connections: one through the user-initiated VPNs and one to the company’s office.

Buy Now
Questions 20

The OSC POC has supplied all of the procedures, policies, and plans at the start of the assessment. One of the assessors notes that some of the documents have very recent approval dates, while others have been in place for several years based on the document history.

In order to ensure the review of this evidence is sufficient, what is the BEST step to validate the sufficiency of these documents?

Options:

A.

Examine the documents to determine if they are complete.

B.

Examine if the procedure in question replaced another document.

C.

Interview OSC team members who should be using the procedure.

D.

Interview people who hold leadership roles named in the documents.

Buy Now
Questions 21

A CCA is assessing the concept of least functionality in accordance with CM.L2-3.4.6: Least Functionality.

Which method is the LEAST LIKELY to be useful as an assessment technique?

Options:

A.

Interview personnel with information security responsibilities.

B.

Interview personnel with application development responsibilities.

C.

Interview personnel who wrote the configuration management policy.

D.

Interview personnel with security configuration management responsibilities.

Buy Now
Questions 22

While examining controls on the use of portable storage devices, an assessor conducts an interview with a mid-level internal system administrator. The administrator describes the process to check out portable storage devices, which includes a user emailing IT staff directly, verifying that the media classification label matches the data classification, and limiting use of the device to a specified external system.

What is a MISSING element for the assessment of AC.L2-3.1.21: Portable Storage Use?

Options:

A.

Method of destruction of portable storage devices

B.

Recorded management authorization for the use of portable storage devices

C.

An inventory of portable storage devices provided by the National Security Agency

D.

A directory of personnel background checks to be consulted prior to device checkout

Buy Now
Questions 23

The assessment team is discussing the pre-assessment scope with an OSC. The OSC would like to limit the scope of the security requirements in environments that contain FCI and/or CUI. In this case, the OSC should:

Options:

A.

Request a single CMMC certification for both activities

B.

Choose to conduct two separate CMMC certification activities

C.

Define an Assessment Scope for those assets that process, store, or transmit FCI

D.

Define a CMMC Self-Assessment Scope for only those assets that process, store, or transmit CUI

Buy Now
Questions 24

During an assessment, the Lead Assessor determines certain assets to be in-scope which the OSC had considered out-of-scope.

The CCA should reply that for assets to be considered out-of-scope they:

Options:

A.

Provide security protections to CUI assets.

B.

Do not provide security protections for CUI assets.

C.

Can, but are not intended to, process, store, or transmit CUI.

D.

Are not required to be physically or logically separated from CUI assets.

Buy Now
Questions 25

An OSC has built an enclave for its production environment. The enclave sits behind a firewall, with all equipment connected through a switch. There is a shipping workstation and physically connected label printer (used for the sales system, which does not process CUI) that the OSC claims are Contractor Risk Managed Assets (CRMA). Other than showing that the shipping workstation and label printer are not intended to store or transmit CUI, and documenting them in the SSP,

how BEST would the OSC show that the shipping workstation and label printer are Contractor Risk Managed Assets?

Options:

A.

Document in the asset inventory and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

B.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using vendor-recommended risk-based security practices; and include them in the network diagram.

C.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using the organization’s risk-based security policies and procedures; and include them in the network diagram.

D.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using industry risk-based security best practices; and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

Buy Now
Questions 26

An OSC has a hardware and software list used to manage company assets. Which is the BEST evidence to show the OSC is managing the system baseline?

Options:

A.

Media protection

B.

Physical protection

C.

Configuration management

D.

Identification and authentication policy

Buy Now
Questions 27

The Lead Assessor is conducting an assessment for an OSC. The Lead Assessor has finished collecting and examining evidence from the assessment.

Based on this information, what is the NEXT logical step?

Options:

A.

Develop an assessment plan.

B.

Deliver recommended assessment results.

C.

Generate final recommended assessment results.

D.

Determine and record initial practice scores.

Buy Now
Questions 28

A company mirrors its FCI/CUI data storage in a cloud environment. Data is managed across multiple virtual machines (VMs). To satisfy requirements for data security of the LOCAL copy using physical controls, what should the OSC do?

Options:

A.

Use encrypted transport and storage of FCI/CUI data on the VMs.

B.

Store FCI/CUI data without encryption for faster access/backup/restore.

C.

Ensure that the VMs are running on hardware that is physically located in a controlled-access facility.

D.

In addition to a password or personal identification number, use physical means to log in such as a smart card or hard token.

Buy Now
Questions 29

During a company’s assessment, the CCA notices that the server room door is kept open with a fan in the entryway because the cooling system is inadequate and the machines are overheating. According to the physical protection policy, the server room’s keypad is the mechanism for managing and controlling access to this equipment, and only the IT team should have access to the server room. However, with the door open, the keypad is not necessary, and anyone can enter the room.

The CCA asks the IT manager how access to this room is protected while the door is open. Which response would allow the company to still meet the physical security requirement?

Options:

A.

“Only employees are allowed in this area.”

B.

“We trust our employees not to enter the room if they are not supposed to.”

C.

“The server is located inside another room that only the IT team has access to.”

D.

“The CEO emailed all employees that the server room door would be kept open but only the IT team should enter.”

Buy Now
Questions 30

Does CMMC Level 2 require that a Cloud Service Provider (CSP) hold a FedRAMP HIGH authorization hosted in a government community cloud (GCC)?

Options:

A.

No. The CSP can obtain a FedRAMP MODERATE equivalency.

B.

No. The CSP must hold a FedRAMP MODERATE authorization.

C.

Yes. FedRAMP HIGH is required for CUI data controls due to the sensitive nature of the Defense Industrial Base systems.

D.

Yes. FedRAMP HIGH authorization demonstrates the CSP compliance with NIST SP 800-53 and SP 800-171 control requirements.

Buy Now
Questions 31

An organization’s password policy includes these requirements:

    Passwords must be at least 8 characters in length.

    Passwords must contain at least one uppercase character, one lowercase character, and one numeric digit.

    Passwords must be changed at least every 90 days.

    When a password is changed, none of the previous 3 passwords can be reused.

Per IA.L2-3.5.7: Password Complexity, what requirement is missing from this password policy?

Options:

A.

It does not require MFA.

B.

It does not include a list of prohibited passwords.

C.

It does not specify a minimum change of character requirement.

D.

It does not require the password to contain at least one special character.

Buy Now
Questions 32

While conducting a CMMC Level 2 Third-Party Assessment of a small defense contractor, an assessor discovers that the contractor’s Information Security Policy has no documented change records demonstrating executive approval. The IT director states that they will add change records in the future, but that other evidence exists. Which documentation is MOST able to demonstrate persistent and habitual adherence to CMMC requirements?

Options:

A.

Handwritten notes from executive committee meetings discussing implementation

B.

Several years’ worth of saved emails from the executive team approving policies and directing adherence

C.

A notarized letter from the previous CEO stating that they approved information security policies annually

D.

Transcribed interviews with new employees discussing their understanding of information security policies

Buy Now
Questions 33

A cloud-native OSC uses a vendor’s FedRAMP MODERATE authorized cloud environment for all aspects of their CUI needs (identity, email, file storage, office suite, etc.) as well as the vendor’s locally installable applications. The OSC properly configured the vendor’s cloud-based SIEM system to monitor all aspects of the cloud environment. The OSC’s SSP documents SI.L2-3.14.7: Identify Unauthorized Use, defining authorized use and referencing procedures for identifying unauthorized use.

How should the Certified Assessor score this practice?

Options:

A.

NOT MET because logs from physical infrastructure are not captured by the SIEM.

B.

NOT MET because locally installable applications from a cloud-native environment are not allowed.

C.

MET because being cloud-native is a great way to contain risk to a vendor’s environment.

D.

MET because the cloud SIEM is configured to monitor all of the vendor’s cloud environment.

Buy Now
Questions 34

What is NOT required for the Lead Assessor to confirm when verifying readiness to conduct an assessment?

Options:

A.

That risks have been identified

B.

That necessary logistics have been arranged

C.

Whether the OSC can better meet the targeted CMMC Level

D.

That evidence is available and accessible for the targeted CMMC Level

Buy Now
Questions 35

While conducting a Level 2 Assessment, the Assessment Team begins reviewing assessment objects. The team identifies concerns with several of the objects presented. Which artifacts would require the MOST verification?

Options:

A.

Current artifacts produced by individuals performing the work

B.

Artifacts created 18 months ago by individuals performing the work

C.

Current artifacts produced by individuals that work for a separate entity of the company

D.

Artifacts created 18 months ago by individuals that work for a separate entity of the company

Buy Now
Questions 36

An OSC is a wholly owned subsidiary of a large conglomerate (parent organization). The OSC and the parent organization use ID badges (PKI cards) that contain a PKI certificate and a radio frequency identification (RFID) tag used for building and system access (including systems that process, transmit, or store CUI). The parent organization does not make any decisions on how the OSC runs its security program or other matters of significance. The large conglomerate operates a machine that is used to activate the badges for both itself and the OSC. This machine is isolated in a locked room and has no network connectivity to the OSC.

The badge activation system is:

Options:

A.

In-scope because the parent organization acts as an External Service Provider to the OSC by providing PKI cards.

B.

In-scope because the OSC is part of the large conglomerate and thus any CMMC requirements of the OSC are imputed onto the large conglomerate.

C.

Out-of-scope because the OSC is the one that assigns the appropriate access to a particular PKI card.

D.

Out-of-scope because the badge activation machine is physically and logically isolated from the OSC and it is under the control of the parent organization.

Buy Now
Questions 37

A C3PAO is conducting a Level 2 assessment of a midsized construction contractor that does both private (commercial) and federal work. The contractor’s documentation states that all CUI flows through a single building on their office campus and is logically, physically, and administratively isolated from the rest of the environment. Why might an assessor request access to assess controls within a building or area not listed as in-scope in the documentation?

Options:

A.

If the assessor sees personnel carrying locked cases into the other building or area

B.

If the OSC has an underground passageway connecting the CUI building to a non-CUI building

C.

If network diagrams indicate the commercial and federal sectors share a single Internet connection

D.

If Human Resources that supports both commercial and federal sectors sits in the other building or area

Buy Now
Questions 38

AC.L2-3.1.6: Non-Privileged Account Use is being assessed. Which procedure BEST meets all of the standards for non-privileged account use?

Options:

A.

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for security tasks.

B.

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their non-privileged account for security tasks.

C.

All non-IT employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for all tasks.

D.

All non-IT employees are given a non-privileged user account.

System Administrators are given only an administrator account.

System Administrators use their administrator account for all tasks.

Buy Now
Questions 39

While conducting an assessment, an assessor is determining if privileged accounts are used for non-privileged functions. While interviewing a user with a privileged account, the assessor should ask if the person interviewed:

Options:

A.

Knows which other users have privileged accounts

B.

Is knowledgeable of role-based access control privileges

C.

Uses their privileged account to research vulnerabilities on the Internet

D.

Can show how IT staff provision privileged and non-privileged accounts

Buy Now
Questions 40

An assessor reviews the OSC’s data protection policy, which requires full disk encryption on company laptops. While interviewing employees, the assessor learns that employees sometimes access data while teleworking on laptops that do not have full disk encryption.

How should the assessor view the implementation of the OSC’s policy?

Options:

A.

Acceptable because it requires full disk encryption of company laptops.

B.

Insufficient because there are teleworking instances where the policy is not followed.

C.

Acceptable as long as an equivalent technical safeguard is implemented for all teleworking scenarios.

D.

Insufficient because full disk encryption is not required for laptops to comply with CMMC requirements.

Buy Now
Questions 41

While examining evidence, a CCA is trying to confirm the claim that the OSC has identified all information system users, processes acting on behalf of users, and all devices.

Which of the following provides the STRONGEST evidence of this practice?

Options:

A.

Lists of system accounts and devices and system audit logs and records

B.

System design documentation and other relevant documents or records

C.

Procedures addressing user and system identification and authentication and SSP

D.

Identification and authentication policy and system configuration settings and associated documentation

Buy Now
Questions 42

During the assessment of a company, the CCA learns that 50% of employees work from home using remote access. After reviewing the Access Control policy and audit logs, the CCA is unsure how the system ensures only employees with correct privileges can access CUI. The CCA decides a Test of functionality is required. Which question is of the LEAST concern to the CCA?

Options:

A.

Are remote access sessions necessary?

B.

Are remote access sessions permitted?

C.

Are remote access sessions monitored?

D.

Are the types of permitted remote access identified?

Buy Now
Questions 43

The Assessment Team is meeting with the OSC team and experiences a situation where some members of the OSC team describe the IT infrastructure differently from others. In some discussions, one person identifies a series of ESPs, while another describes the infrastructure as on-premises. What should the Lead Assessor do to clarify the actual operational environment?

Options:

A.

Review the network diagrams

B.

Interview an authoritative OSC representative

C.

Review the system interconnection agreements

D.

Ask for the contact information of the identified ESPs

Buy Now
Questions 44

The OSC’s network consists of a single unmanaged switch that connects all devices, including OT equipment which cannot run a vendor-supported operating system. The OSC correctly scoped the OT equipment as a Specialized Asset, listed it in their inventory and SSP, and provided a network diagram showing plans to isolate the OT and apply additional security measures. What information does the Lead Assessor still require to ensure compliance?

Options:

A.

Installation and configuration documentation for the OT to ensure it was correctly built

B.

Wording in the scoping document detailing how the OT adheres to all other applicable CMMC practices

C.

Wording in the SSP detailing how the OT is managed using the OSC’s risk-based security policies, procedures, and practices

D.

Evidence that the network isolation is completed by the end of the assessment as well as supporting evidence for all other applicable CMMC practices

Buy Now
Questions 45

An OSC is presenting evidence of its fulfillment of CM.L2-3.4.1: System Baselining. It provides:

    System inventory records showing additions/removals of machines,

    Software inventory showing installations/removals, and

    A system component installation plan with software needs and user specifications.

What other documentation MUST the company present to illustrate compliance with CM.L2-3.4.1?

Options:

A.

Documentation of the physical safeguards protecting the “gold” baseline images

B.

Documentation of a formal baseline review integrated with a system development lifecycle

C.

Documentation of any authorized deviations from the system baselines for end-user computers

D.

Documentation of a formal chain of custody for new hardware on which baselines will be installed

Buy Now
Exam Code: CMMC-CCA
Exam Name: Certified CMMC Assessor (CCA) Exam
Last Update: Oct 15, 2025
Questions: 150
$66  $164.99
$50  $124.99
$42  $104.99
buy now CMMC-CCA