Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Cyber AB CMMC-CCP Certified CMMC Professional (CCP) Exam Exam Practice Test

Demo: 65 questions
Total 221 questions

Certified CMMC Professional (CCP) Exam Questions and Answers

Question 1

During the planning phase of the Assessment Process. C3PAO staff are reviewing the various entities associated with an OSC that has requested a CMMC Level 2 Assessment. Which term describes the people, processes, and technology external to the HQ Organization that participate in the assessment but will not receive a CMMC Level unless an enterprise Assessment is conducted?

Options:

A.

Host Unit

B.

Organization

C.

Coordinating Unit

D.

Supporting Organization/Unit

Question 2

What service is the MOST comprehensive that the RPO provides?

Options:

A.

Training services

B.

Education services

C.

Consulting services

D.

Assessment services

Question 3

Which NIST SP discusses protecting CUI in nonfederal systems and organizations?

Options:

A.

NIST SP 800-37

B.

NIST SP 800-53

C.

NIST SP 800-88

D.

NIST SP 800-171

Question 4

A C3PAO Assessment Plan document captures the names of the interviewees, the facilities that will utilized, along with estimated costs and schedule of the assessment. What part of the assessment plan is this?

Options:

A.

Identify resources and schedule.

B.

Select Assessment Team members.

C.

Identify and manage assessment risks.

D.

Select and develop the evidence collection approach.

Question 5

An assessor is collecting affirmations. So far, the assessor has collected interviews, demonstrations, emails, messaging, and presentations. Are these appropriate approaches to collecting affirmations?

Options:

A.

No, emails are not appropriate affirmations.

B.

No, messaging is not an appropriate affirmation.

C.

Yes, the affirmations collected by the assessor are all appropriate.

D.

Yes, the affirmations collected by the assessor are all appropriate, as are screenshots.

Question 6

Two assessors cannot agree if a certain practice should be rated as MET or NOT MET. Who should they consult to determine the final interpretation?

Options:

A.

C3PAO

B.

CMMC-AB

C.

Lead Assessor

D.

Quality Assurance Assessor

Question 7

In scoping a CMMC Level 1 Self-Assessment, it is determined that an ESP employee has access to FCI. What is the ESP employee considered?

Options:

A.

In scope

B.

Out of scope

C.

OSC point of contact

D.

Assessment Team Member

Question 8

Which resource contains authoritative data classifications of CUI?

Options:

A.

NARA

B.

CMMC-AB

C.

DoD Contractors FAQ

D.

OSC's privacy policies

Question 9

What is the MINIMUM required marking for a document containing CUI?

Options:

A.

"CUI" must be placed in the header and footer of the document

B.

"WCUI" must be placed in the header and footer of the document

C.

Portion marks must be placed on all sections, parts, paragraphs, etc. known to contain CUI

D.

A cover page must be placed to obscure content with the acronym "CUI" prominently placed

Question 10

Which statement BEST describes an assessor's evidence gathering activities?

Options:

A.

Use interviews for assessing a Level 2 practice.

B.

Test all practices or objectives for a Level 2 practice

C.

Test certain assessment objectives to determine findings.

D.

Use examinations, interviews, and tests to gather sufficient evidence.

Question 11

Which statement is NOT a measure to determine if collected evidence is sufficient?

Options:

A.

Evidence covers the sampled organization

B.

Evidence is not required if the practice is ISO certified

C.

Evidence covers the model scope of the Assessment (Target CMMC Level)

D.

Evidence corresponds to the sampled organization in the evidence collection approach

Question 12

A CMMC Level 1 Self-Assessment identified an asset in the OSC's facility that does not process, store, or transmit FCI. Which type of asset is this considered?

Options:

A.

FCI Assets

B.

Specialized Assets

C.

Out-of-Scope Assets

D.

Government-Issued Assets

Question 13

What is the primary intent of the verify evidence and record gaps activity?

Options:

A.

Map test and demonstration responses to CMMC practices.

B.

Conduct interviews to test process implementation knowledge.

C.

Determine the one-to-one relationship between a practice and an assessment object.

D.

Identify and describe differences between what the Assessment Team required and the evidence collected.

Question 14

The director of cybersecurity is considering which company offices and data centers store FCI to ensure an accurate scope for their CMMC Level 1 Self-Assessment . Which asset type is the director considering?

Options:

A.

ESP

B.

People

C.

Facilities

D.

Technology

Question 15

In late September. CA.L2-3.12.1: Periodically assess the security controls in organizational systems to determine if the controls are effective in their application is assessed. Procedure specifies that a security control assessment shall be conducted quarterly. The Lead Assessor is only provided the first quarter assessment report because the person conducting the second quarter's assessment is currently out of the office and will return to the office in two hours. Based on this information, the Lead Assessor should determine that the evidence is;

Options:

A.

sufficient, and rate the audit finding as MET

B.

insufficient, and rate the audit finding as NOT MET.

C.

sufficient, and re-rate the audit finding after a quarter two assessment report is examined.

D.

insufficient, and re-rate the audit finding after a quarter two assessment report is examined.

Question 16

Which term describes a group of individuals that conduct operational network vulnerability evaluations and provide mitigation techniques to customers?

Options:

A.

Red team

B.

Blue team

C.

White hat hackers

D.

Penetration test team

Question 17

Which CMMC Levels focus on protecting CUI from exfiltration?

Options:

A.

Levels 1 and 2

B.

Levels 1 and 3

C.

Levels 2 and 3

D.

Levels 1, 2, and 3

Question 18

An Assessment Team is reviewing a practice that is documented and being checked monthly. When reviewing the logs, the practice is only being completed quarterly. During the interviews, the team members say they perform the practice monthly but only document quarterly. Is this sufficient to pass the practice?

Options:

A.

No, the work is not being done as stated.

B.

Yes, the practice is being done as documented.

C.

No, all three assessment methods must be met to pass.

D.

Yes. the interview process is enough to pass a practice.

Question 19

The Assessment Team has completed Phase 2 of the Assessment Process. In conducting Phase 3 of the Assessment Process, the Assessment Team is reviewing evidence to address Limited Practice Deficiency Corrections. How should the team score practices in which the evidence shows the deficiencies have been corrected?

Options:

A.

MET

B.

POA & M

C.

NOT MET

D.

NOT APPLICABLE

Question 20

An organization's sales representative is tasked with entering FCI data into various fields within a spreadsheet on a company-issued laptop. This laptop is an FCI Asset being used to:

Options:

A.

process and transmit FCI.

B.

process and organize FCI.

C.

store, process, and transmit FCI.

D.

store, process, and organize FCI.

Question 21

When assessing an OSC for CMMC: the Lead Assessor should use the information from the Discussion and Further Discussion sections in each practice because it:

Options:

A.

is normative for an OSC to follow.

B.

contains examples that an OSC must implement.

C.

is mandatory and aligns with FAR Clause 52.204-21.

D.

provides additional information to facilitate the assessment of the practice.

Question 22

For CMMC Assessments, during Phase 1 of the CMMC Assessment Process, which are responsible for identifying potential conflicts of information?

Options:

A.

C3PAO and OSC

B.

OSC and CMMC-AB

C.

CMMC-AB and C3PAO

D.

Lead Assessor and Assessment Team Members

Question 23

A cyber incident is discovered that affects a covered contractor IS and the CDI residing therein. How long does the contractor have to inform the DoD?

Options:

A.

24 hours

B.

48 hours

C.

72 hours

D.

96 hours

Question 24

As defined in the CMMC-AB Code of Professional Conduct, what term describes any contract between two legal entities?

Options:

A.

Union

B.

Accord

C.

Alliance

D.

Agreement

Question 25

An Assessment Team is conducting a Level 2 Assessment at the request of an OSC. The team has begun to score practices based on the evidence provided. At a MINIMUM what is required of the Assessment Team to determine if a practice is scored as MET?

Options:

A.

All three types of evidence are documented for every control.

B.

Examine and accept evidence from one of the three evidence types.

C.

Complete one of the following; examine two artifacts, either observe a satisfactory demonstration of one control or receive one affirmation from the OSC personnel.

D.

Complete two of the following: examine one artifact, either observe a satisfactory demonstration of one control or receive one affirmation from the OSC personnel.

Question 26

A machining company has been awarded a contract with the DoD to build specialized parts. Testing of the parts will be done by the company using in-house staff and equipment. For a Level 1 Self-Assessment, what type of asset is this?

Options:

A.

CUI Asset

B.

In-scope Asset

C.

Specialized Asset

D.

Contractor Risk Managed Asset

Question 27

At which CMMC Level do the Security Assessment (CA) practices begin?

Options:

A.

Level 1

B.

Level 2

C.

Level 3

D.

Level 4

Question 28

Contractor scoping requirements for a CMMC Level 2 Assessment to document the asset in an inventory, in the SSP and on the network diagram apply to:

Options:

A.

GUI Assets.

B.

CUI and Security Protection Asset categories.

C.

all asset categories except for the Out-of-scope Assets.

D.

Contractor Risk Managed Assets and Specialized Assets.

Question 29

Where does the requirement to include a required practice of ensuring that personnel are trained to carry out their assigned information security-related duties and responsibilities FIRST appear?

Options:

A.

Level 1

B.

Level 2

C.

Level 3

D.

All levels

Question 30

Per DoDI 5200.48: Controlled Unclassified Information (CUI), CUI is marked by whom?

Options:

A.

DOD OUSD

B.

Authorized holder

C.

Information Disclosure Official

D.

Presidentially authorized Original Classification Authority

Question 31

Two network administrators are working together to determine a network configuration in preparation for CMMC. The administrators find that they disagree on a couple of small items. Which solution is the BEST way to ensure compliance with CMMC?

Options:

A.

Consult with the CEO of the company.

B.

Consult the CMMC Assessment Guides and NIST SP 800-171.

C.

Go with the network administrator's ideas with the least stringent controls.

D.

Go with the network administrator's ideas with the most stringent controls.

Question 32

Which domain has a practice requiring an organization to restrict, disable, or prevent the use of nonessential programs?

Options:

A.

Access Control (AC)

B.

Media Protection (MP)

C.

Asset Management (AM)

D.

Configuration Management (CM)

Question 33

A company is working with a CCP from a contracted CMMC consulting company. The CCP is asked where the Host Unit is required to document FCI and CUI for a CMMC Assessment. How should the CCP respond?

Options:

A.

"In the SSP. within the asset inventory, and in the network diagranY'

B.

"Within the hardware inventory, data (low diagram, and in the network diagram"

C.

"Within the asset inventory, in the proposal response, and in the network diagram"

D.

"In the network diagram, in the SSP. within the base inventory, and in the proposal response'"

Question 34

Which example represents a Specialized Asset?

Options:

A.

SOCs

B.

Hosted VPN services

C.

Consultants who provide cybersecurity services

D.

All property owned or leased by the government

Question 35

A member of the Assessment Team has been assigned the responsibility of maintaining and protecting information from the OSC. The Assessment Results Package, PCI, CUI, and any notes must be retained and protected from disclosure. To protect the OSC's information, which principle should be used, and for how long?

Options:

A.

Cryptography and hashing for 1 year

B.

Confidentiality and non-disclosure for 3 years

C.

Availability, confidentiality, and integrity for 1 year

D.

Authentication, authorization, and accounting for 3 years

Question 36

A C3PAO is near completion of a Level 2 Assessment for an OSC. The CMMC Findings Brief and CMMC Assessment Results documents have been developed. The Final Recommended Assessment Results are being generated. When generating these results, what MUST be included?

Options:

A.

An updated Assessment Plan

B.

Recorded and final updated Daily Checkpoint

C.

Fully executed CMMC Assessment contract between the C3PAO and the OSC

D.

Review documentation for the CMMC Quality Assurance Professional (CQAP)

Question 37

A company has a government services division and a commercial services division. The government services division interacts exclusively with federal clients and regularly receives FCI. The commercial services division interacts exclusively with non-federal clients and processes only publicly available information. For this company's CMMC Level 1 Self-Assessment, how should the assets supporting the commercial services division be categorized?

Options:

A.

FCI Assets

B.

Specialized Assets

C.

Out-of-Scope Assets

D.

Operational Technology Assets

Question 38

In CMMC High-Level scoping, which definition BEST describes an HQ organization?

Options:

A.

The entity that carries out the tasks under a contract

B.

The unit to which a CMMC Level is applied for each contract

C.

The teams, services, and technologies that provide support to a Host Unit

D.

The entity legally responsible for the delivery of products or services under a contract

Question 39

Which words summarize categories of data disposal described in the NIST SP 800-88 Revision 1, Guidelines for Media Sanitation?

Options:

A.

Clear, purge, destroy

B.

Clear, redact, destroy

C.

Clear, overwrite, purge

D.

Clear, overwrite, destroy

Question 40

The Lead Assessor interviews a network security specialist of an OSC. The incident monitoring report for the month shows that no security incidents were reported from OSC's external SOC service provider. This is provided as evidence for RA.L2-3.11.2: Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified. Based on this information, the Lead Assessor should conclude that the evidence is:

Options:

A.

inadequate because it is irrelevant to the practice.

B.

adequate because it fits well for expected artifacts.

C.

adequate because no security incidents were reported.

D.

inadequate because the OSC's service provider should be interviewed.

Question 41

During a CMMC readiness review, the OSC proposes that an associated enclave should not be applicable in the scope. Who is responsible for verifying this request?

Options:

A.

CCP

B.

C3PAO

C.

Lead Assessor

D.

Advisory Board

Question 42

Which document is used to protect sensitive and confidential information from being made available by the recipient of that information?

Options:

A.

Legal agreement

B.

CMMC agreement

C.

Assessment agreement

D.

Non-disclosure agreement

Question 43

Plan of Action defines the clear goal or objective for the plan. What information is generally NOT a part of a plan of action?

Options:

A.

Completion dates

B.

Milestones to measure progress

C.

Ownership of who is accountable for ensuring plan performance

D.

Budget requirements to implement the plan's remediation actions

Question 44

Which phase of the CMMC Assessment Process includes the task to identify, obtain inventory, and verify evidence?

Options:

A.

Phase 1: Plan and Prepare Assessment

B.

Phase 2: Conduct Assessment

C.

Phase 3: Report Recommended Assessment Results

D.

Phase 4: Remediation of Outstanding Assessment Issues

Question 45

Which NIST SP defines the Assessment Procedure leveraged by the CMMC?

Options:

A.

NIST SP 800-53

B.

NISTSP800-53a

C.

NIST SP 800-171

D.

NISTSP800-171a

Question 46

Which entity specifies the required CMMC Level in Requests for Information and Requests for Proposals?

Options:

A.

DoD

B.

NARA

C.

NIST

D.

Department of Homeland Security

Question 47

When are data and documents with legacy markings from or for the DoD required to be re-marked or redacted?

Options:

A.

When under the control of the DoD

B.

When the document is considered secret

C.

When a document is being shared outside of the organization

D.

When a derivative document's original information is not CUI

Question 48

SI.L2-3.14.7: Identify unauthorized use of organizational systems is being assessed using two assessment objectives. The assessment objectives are to determine if authorized use of the system is defined and to determine if unauthorized use of the system is identified. What is the BEST evidence for this practice?

Options:

A.

Risk response

B.

Risk assessment

C.

Incident response

D.

System monitoring

Question 49

Which CMMC Levels meet the standards of protecting FCI (Federal Contract Information) ?

Options:

A.

Level 1

B.

Level 2

C.

Levels 2 and 3

D.

Levels 1, 2, and 3

Question 50

What is the BEST description of the purpose of FAR clause 52 204-21?

Options:

A.

It directs all covered contractors to install the cyber security systems listed in that clause.

B.

It describes all of the safeguards that contractors must take to secure covered contractor IS.

C.

It describes the minimum standard of care that contractors must take to secure covered contractor IS.

D.

It directs covered contractors to obtain CMMC Certification at the level equal to the lowest requirement of their contracts.

Question 51

A CCP is providing consulting services to a company who is an OSC. The CCP is preparing the OSC for a CMMC Level 2 assessment. The company has asked the CCP who is responsible for determining the CMMC Assessment Scope and who validates its CMMC Assessment Scope. How should the CCP respond?

Options:

A.

"The OSC determines the CMMC Assessment Scope, and the CCP validates the CMMC Assessment Scope."

B.

"The OSC determines the CMMC Assessment Scope, and the C3PAO validates the CMMC Assessment Scope."

C.

"The CMMC Lead Assessor determines the CMMC Assessment Scope, and the OSC validates the CMMC Assessment Scope."

D.

"The CMMC C3PAO determines the CMMC Assessment Scope, and the Lead Assessor validates the CMMC Assessment Scope."

Question 52

How many domains does the CMMC Model consist of?

Options:

A.

14 domains

B.

43 domains

C.

72 domains

D.

110 domains

Question 53

During an assessment, the Lead Assessor reviews the evidence for each CMMC in-scope practice that has been reviewed, verified, rated, and discussed with the OSC during the daily reviews. The Assessment Team records the final recommended MET or NOT MET rating and prepares to present the results to the assessment participants during the final review with the OSC and sponsor. As a part of this presentation, which document MUST include the attendee list, time/date, location/meeting link, results from all discussed topics, including any resulting actions, and due dates from the OSC or Assessment Team?

Options:

A.

Final log report

B.

Final CMMC report

C.

Final and recorded OSC CMMC report

D.

Final and recorded Daily Checkpoint log

Question 54

During a Level 2 Assessment, the OSC has provided an inventory list of all hardware. The list includes servers, workstations, and network devices. Why should this evidence be sufficient for making a scoring determination for AC.L2-3.1.19: Encrypt CUI on mobile devices and mobile computing platforms?

Options:

A.

The inventory list does not specify mobile devices.

B.

The interviewee attested to encrypting all data at rest.

C.

The inventory list does not include Bring Your Own Devices.

D.

The DoD has accepted an alternative safeguarding measure for mobile devices.

Question 55

Which document is the BEST source for descriptions of each practice or process contained within the various CMMC domains?

Options:

A.

CMMC Glossary

B.

CMMC Appendices

C.

CMMC Assessment Process

D.

CMMC Assessment Guide Levels 1 and 2

Question 56

What type of information is NOT intended for public release and is provided by or generated for the government under a contract to develop or deliver a product or service to the government, but not including information provided by the government to the public (such as on public websites) or simple transactional information, such as necessary to process payments?

Options:

A.

CDI

B.

CTI

C.

CUI

D.

FCI

Question 57

Which are guiding principles in the CMMC Code of Professional Conduct?

Options:

A.

Objectivity, information integrity, and higher accountability

B.

Objectivity, information integrity, and proper use of methods

C.

Proper use of methods, higher accountability, and objectivity

D.

Proper use of methods, higher accountability, and information integrity

Question 58

An Assessment Team Member is conducting a CMMC Level 2 Assessment for an OSC that is in the process of inspecting Assessment Objects for AC.L1-3.1.1: Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems) to determine the adequacy of evidence provided by the OSC. Which Assessment Method does this activity fall under?

Options:

A.

Test

B.

Observe

C.

Examine

D.

Interview

Question 59

According to DFARS clause 252.204-7012, who is responsible for determining that Information in a given category should be considered CUI?

Options:

A.

The NARA CUI Executive Agent

B.

The contractor who generated the information

C.

The DoD agency for whom the contractor is performing the work

D.

The military personnel assigned to the contractor for that purpose

Question 60

What type of criteria is used to answer the question "Does the Assessment Team have the right evidence?"

Options:

A.

Adequacy criteria

B.

Objectivity criteria

C.

Sufficiency criteria

D.

Subjectivity criteria

Question 61

In scoping a CMMC Level 1 Self-Assessment, all of the computers and digital assets that handle FCI are identified. A file cabinet that contains paper FCI is also identified. What can this file cabinet BEST be determined to be?

Options:

A.

In scope, because it is an asset that stores FCI

B.

In scope, because it is part of the same physical location

C.

Out of scope, because they are all only paper documents

D.

Out of scope, because it does not process or transmit FCI

Question 62

During a Level 1 Self-Assessment, a smart thermostat was identified. It is connected to the Internet on the OSC's WiFi network. What type of asset is this?

Options:

A.

FCI Asset

B.

CUI Asset

C.

In-scope Asset

D.

Specialized Asset

Question 63

Which document BEST determines the existence of FCI and/or CUI in scoping an assessment with an OSC?

Options:

A.

OSC SSP

B.

OSC POA & M

C.

OSC Evidence

D.

OSC Contract with DoD

Question 64

Validation of findings is an iterative process usually performed during the Daily Checkpoints throughout the entire assessment process. As a validation activity, why are the preliminary findings important?

Options:

A.

It allows the OSC to comment and provide additional evidence.

B.

It determines whether the OSC will be rated MET or NOT MET on their assessment.

C.

It confirms that the Assessment Team's findings are right and cannot be changed.

D.

It corroborates the Assessment Team's understanding of the CMMC practices and controls.

Question 65

Prior to conducting a CMMC Assessment, the contractor must specify the CMMC Assessment scope by categorizing all assets. Which two asset categories are always assessed against CMMC practices?

Options:

A.

CUI Assets and Specialized Assets

B.

Security Protection Assets and CUI Assets

C.

Specialized Assets and Contractor Risk Managed Assets

D.

Security Protection Assets and Contractor Risk Managed Assets

Demo: 65 questions
Total 221 questions