Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

A CMMC Assessment is being conducted at an OSC's HQ. which is a shared workspace in a multi-tenant building. The OSC is renting four offices on the first floor that can be locked individually. The first-floor conference room is shared with other tenants but has been reserved to conduct the assessment. The conference room has a desk with a drawer that does not lock. At the end of the day, an evidence file that had been sent by email is reviewed. What is the BEST way to handle this file?

A.

Review it. print it, and put it in the desk drawer.

B.

Review it, and make notes on the computer provided by the client.

C.

Review it, print it, make notes, and then shred it in cross-cut shredder in the print room.

D.

Review it. print it, and leave it in a folder on the table together with the other documents.

Full Access
Question # 5

An organization's sales representative is tasked with entering FCI data into various fields within a spreadsheet on a company-issued laptop. This laptop is an FCI Asset being used to:

A.

process and transmit FCI.

B.

process and organize FCI.

C.

store, process, and transmit FCI.

D.

store, process, and organize FCI.

Full Access
Question # 6

According to the Configuration Management (CM) domain, which principle is the basis for defining essential system capabilities?

A.

Least privilege

B.

Essential concern

C.

Least functionality

D.

Separation of duties

Full Access
Question # 7

Validation of findings is an iterative process usually performed during the Daily Checkpoints throughout the entire assessment process. As a validation activity, why are the preliminary findings important?

A.

It allows the OSC to comment and provide additional evidence.

B.

It determines whether the OSC will be rated MET or NOT MET on their assessment.

C.

It confirms that the Assessment Team's findings are right and cannot be changed.

D.

It corroborates the Assessment Team's understanding of the CMMC practices and controls.

Full Access
Question # 8

Ethics is a shared responsibility between:

A.

DoD and CMMC-AB.

B.

OSC and sponsors.

C.

CMMC-AB and members of the CMMC Ecosystem.

D.

members of the CMMC Ecosystem and Lead Assessors.

Full Access
Question # 9

Contractor scoping requirements for a CMMC Level 2 Assessment to document the asset in an inventory, in the SSP and on the network diagram apply to:

A.

GUI Assets.

B.

CUI and Security Protection Asset categories.

C.

all asset categories except for the Out-of-scope Assets.

D.

Contractor Risk Managed Assets and Specialized Assets.

Full Access
Question # 10

An Assessment Team is conducting a Level 2 Assessment at the request of an OSC. The team has begun to score practices based on the evidence provided. At a MINIMUM what is required of the Assessment Team to determine if a practice is scored as MET?

A.

All three types of evidence are documented for every control.

B.

Examine and accept evidence from one of the three evidence types.

C.

Complete one of the following; examine two artifacts, either observe a satisfactory demonstration of one control or receive one affirmation from the OSC personnel.

D.

Complete two of the following: examine one artifact, either observe a satisfactory demonstration of one control or receive one affirmation from the OSC personnel.

Full Access
Question # 11

When are contractors required to achieve a CMMC certificate at the Level specified in the solicitation?

A.

At the time of award

B.

Upon solicitation submission

C.

Thirty days from the award date

D.

Before the due date of submission

Full Access
Question # 12

An Assessment Team is reviewing a practice that is documented and being checked monthly. When reviewing the logs, the practice is only being completed quarterly. During the interviews, the team members say they perform the practice monthly but only document quarterly. Is this sufficient to pass the practice?

A.

No, the work is not being done as stated.

B.

Yes, the practice is being done as documented.

C.

No, all three assessment methods must be met to pass.

D.

Yes. the interview process is enough to pass a practice.

Full Access
Question # 13

A company is working with a CCP from a contracted CMMC consulting company. The CCP is asked where the Host Unit is required to document FCI and CUI for a CMMC Assessment. How should the CCP respond?

A.

"In the SSP. within the asset inventory, and in the network diagranY'

B.

"Within the hardware inventory, data (low diagram, and in the network diagram"

C.

"Within the asset inventory, in the proposal response, and in the network diagram"

D.

"In the network diagram, in the SSP. within the base inventory, and in the proposal response'"

Full Access
Question # 14

Evidence gathered from an OSC is being reviewed. Based on the assessment and organizational scope, the Lead Assessor requests the Assessment Team to verify that the coverage by domain, practice. Host Unit. Supporting Organization/Unit, and enclaves are comprehensive enough to rate against each practice. Which criteria is the assessor referring to?

A.

Adequacy

B.

Capability

C.

Sufficiency

D.

Objectivity

Full Access
Question # 15

What is a PRIMARY activity that is performed while conducting an assessment?

A.

Develop assessment plan.

B.

Collect and examine evidence.

C.

Verify readiness to conduct assessment.

D.

Deliver recommended assessment results.

Full Access
Question # 16

What type of information is NOT intended for public release and is provided by or generated for the government under a contract to develop or deliver a product or service to the government, but not including information provided by the government to the public (such as on public websites) or simple transactional information, such as necessary to process payments?

A.

CDI

B.

CTI

C.

CUI

D.

FCI

Full Access
Question # 17

A dedicated local printer is used to print out documents with FCI in an organization. This is considered an FCI Asset Which function BEST describes what the printer does with the FCI?

A.

Encrypt

B.

Manage

C.

Process

D.

Distribute

Full Access
Question # 18

The Level 1 practice description in CMMC is Foundational. What is the Level 2 practice description?

A.

Expert

B.

Advanced

C.

Optimizing

D.

Continuously Improved

Full Access
Question # 19

Which document is the BEST source for descriptions of each practice or process contained within the various CMMC domains?

A.

CMMC Glossary

B.

CMMC Appendices

C.

CMMC Assessment Process

D.

CMMC Assessment Guide Levels 1 and 2

Full Access
Question # 20

An assessor has been working with an OSC's point of contact to plan and prepare for their upcoming assessment. What is one of the MOST important things to remember when analyzing requirements for an assessment?

A.

Scoping an assessment is easy and worry-free.

B.

The initial plan cannot be changed once agreed upon.

C.

There is a determined amount of time that the OSC's point of contact has to submit evidence and rough order-of-magnitude.

D.

Assessors need to continuously review and update the requirements and plan for the assessment as information is gathered.

Full Access
Question # 21

In the Code of Professional Conduct, what does the practice of Professionalism require?

A.

Do not copy materials without permission to do so.

B.

Do not make assertions about assessment outcomes.

C.

Refrain from dishonesty in all dealings regarding CMMC.

D.

Ensure the security of all information discovered or received.

Full Access
Question # 22

A C3PAO is near completion of a Level 2 Assessment for an OSC. The CMMC Findings Brief and CMMC Assessment Results documents have been developed. The Final Recommended Assessment Results are being generated. When generating these results, what MUST be included?

A.

An updated Assessment Plan

B.

Recorded and final updated Daily Checkpoint

C.

Fully executed CMMC Assessment contract between the C3PAO and the OSC

D.

Review documentation for the CMMC Quality Assurance Professional (CQAP)

Full Access
Question # 23

Which phase of the CMMC Assessment Process includes developing the assessment plan?

A.

Phase 1

B.

Phase 2

C.

Phase 3

D.

Phase 4

Full Access
Question # 24

As defined in the CMMC-AB Code of Professional Conduct, what term describes any contract between two legal entities?

A.

Union

B.

Accord

C.

Alliance

D.

Agreement

Full Access
Question # 25

Who will verify the adequacy and sufficiency of evidence to determine whether the practices and related components for each in-scope Host Unit. Supporting Organization/Unit, or enclave has been met?

A.

OSC

B.

Assessment Team

C.

Authorizing official

D.

Assessment official

Full Access
Question # 26

The practices in CMMC Level 2 consists of the security requirements specified in:

A.

NISTSP 800-53.

B.

NISTSP 800-171.

C.

48 CFR 52.204-21.

D.

DFARS 252.204-7012.

Full Access
Question # 27

An OSC has requested a C3PAO to conduct a Level 2 Assessment. The C3PAO has agreed, and the two organizations have collaborated to develop the Assessment Plan. Who agrees to and signs off on the Assessment Plan?

A.

OSC and Sponsor

B.

OSC and CMMC-AB

C.

Lead Assessor and C3PAO

D.

C3PAO and Assessment Official

Full Access
Question # 28

A C3PAO is conducting High Level Scoping for an OSC that requested an assessment Which term describes the people, processes, and technology that will be applied to the contract who are requesting a CMMC Level assessment?

A.

Host Unit

B.

Branch Office

C.

Coordinating Unit

D.

Supporting Organization/Units

Full Access
Question # 29

An OSC receives an email with "CUI//SP-PRVCY//FED Only" in the body of the message Which organization's website should the OSC go to identify what this marking means?

A.

NARA

B.

CMMC-AB

C.

DoD Contractors FAQ page

D.

DoD 239.7601 Definitions page

Full Access
Question # 30

SC.L2-3 13.14: Control and monitor the use of VoIP technologies is marked as NOT APPLICABLE for an OSC's assessment. How does this affect the assessment scope?

A.

Any existing telephone system is in scope even if it is not using VoIP technology.

B.

An error has been made and the Lead Assessor should be contacted to correct the error.

C.

VoIP technology is within scope, and it uses FlPS-validated encryption, so it does not need to be assessed.

D.

VoIP technology is not used within scope boundary, so no assessment procedures are specified for this practice.

Full Access
Question # 31

An assessor needs to get the most accurate answers from an OSC's team members. What is the BEST method to ensure that the OSC's team members are able to describe team member responsibilities?

A.

Interview groups of people to get collective answers.

B.

Understand that testing is more important that interviews.

C.

Ensure confidentiality and non-attribution of team members.

D.

Let team members know the questions prior to the assessment.

Full Access
Question # 32

While developing an assessment plan for an OSC. it is discovered that the certified assessor will be interviewing a former college roommate. What is the MOST correct action to take?

A.

Do not inform the OSC and the C3PAO of the possible conflict of interest, and continue as planned.

B.

Inform the OSC and the C3PAO of the possible conflict of interest, and start the entire process over without the conflicted team member.

C.

Inform the OSC and the C3PAO of the possible conflict of interest but since it has been an acceptable amount of time since college, no conflict of interest exists, and continue as planned.

D.

Inform the OSC and the C3PAO of the possible conflict of interest, document the conflict and mitigation actions in the assessment plan, and if the mitigation actions are acceptable, continue with the assessment.

Full Access
Question # 33

Which term describes "the protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to. or modification of information"?

A.

Adopted security

B.

Adaptive security

C.

Adequate security

D.

Advanced security

Full Access
Question # 34

While conducting a CMMC Assessment, a Lead Assessor is given documentation attesting to Level 1 identification and authentication practices by the OSC. The Lead Assessor asks the CCP to review the documentation to determine if identification and authentication controls are met. Which documentation BEST satisfies the requirements of IA.L1-3.5.1: Identify system users. processes acting on behalf of users, and devices?

A.

Procedures for implementing access control lists

B.

List of unauthorized users that identifies their identities and roles

C.

User names associated with system accounts assigned to those individuals

D.

Physical access policy that states. "All non-employees must wear a special visitor pass or be escorted."

Full Access
Question # 35

What type of criteria is used to answer the question "Does the Assessment Team have the right evidence?"

A.

Adequacy criteria

B.

Objectivity criteria

C.

Sufficiency criteria

D.

Subjectivity criteria

Full Access
Question # 36

A Level 2 Assessment of an OSC is winding down and the final results are being prepared to present to the OSC. When should the final results be delivered to the OSC?

A.

At the end of every day of the assessment

B.

Daily and during a final separately scheduled review

C.

Either at the final Daily Checkpoint, or during a separately scheduled findings and recommendation review

D.

Either after approval from the C3PAO. or during a separately scheduled final recommended findings review

Full Access
Question # 37

A contractor has implemented IA.L2-3.5.3: Multifactor Authentication practice for their privileged users, however, during the assessment it was discovered that the OSC's standard users do not require MFA to access their endpoints and network resources. What would be the BEST finding?

A.

The process is running correctly.

B.

It is out of scope as this is a new acquisition.

C.

The new acquisition is considered Specialized Assets.

D.

Practice is NOT MET since the objective was not implemented.

Full Access
Question # 38

Which statement BEST describes an assessor's evidence gathering activities?

A.

Use interviews for assessing a Level 2 practice.

B.

Test all practices or objectives for a Level 2 practice

C.

Test certain assessment objectives to determine findings.

D.

Use examinations, interviews, and tests to gather sufficient evidence.

Full Access
Question # 39

Per DoDI 5200.48: Controlled Unclassified Information (CUI), CUI is marked by whom?

A.

DoD OUSD

B.

Authorized holder

C.

Information Disclosure Official

D.

Presidential authorized Original Classification Authority

Full Access
Question # 40

After completing a Level 2 Assessment, a C3PAO is preparing to upload the Assessment Results Package to Enterprise Mission Assurance Support Service. Which document MUST be included as part of the final assessment results package?

A.

Final Report

B.

Certification rating

C.

Summary-level findings

D.

All Daily Checkpoint logs

Full Access
Question # 41

A CCP is on their first assessment for CMMC Level 2 with an Assessment Team and is reviewing the CMMC Assessment Process to understand their responsibilities. Which method gathers information from the subject matter experts to facilitate understanding and achieve clarification?

A.

Test

B.

Examine

C.

Interview

D.

Assessment

Full Access
Question # 42

Which code or clause requires that a contractor is meeting the basic safeguarding requirements for FCI during a Level 1 Self-Assessment?

A.

FAR 52.204-21

B.

22CFR 120-130

C.

DFARS 252.204-7011

D.

DFARS 252.204-7021

Full Access
Question # 43

A Lead Assessor is presenting an assessment kickoff and opening briefing. What topic MUST be included?

A.

Gathering evidence

B.

Review of the OSC's SSP

C.

Overview of the assessment process

D.

Examination of the artifacts for sufficiency

Full Access
Question # 44

Which NIST SP discusses protecting CUI in nonfederal systems and organizations?

A.

NIST SP 800-37

B.

NIST SP 800-53

C.

NIST SP 800-88

D.

NIST SP 800-171

Full Access
Question # 45

During an assessment, the Lead Assessor reviews the evidence for each CMMC in-scope practice that has been reviewed, verified, rated, and discussed with the OSC during the daily reviews. The Assessment Team records the final recommended MET or NOT MET rating and prepares to present the results to the assessment participants during the final review with the OSC and sponsor. As a part of this presentation, which document MUST include the attendee list, time/date, location/meeting link, results from all discussed topics, including any resulting actions, and due dates from the OSC or Assessment Team?

A.

Final log report

B.

Final CMMC report

C.

Final and recorded OSC CMMC report

D.

Final and recorded Daily Checkpoint log

Full Access
Question # 46

In many organizations, the protection of FCI includes devices that are used to scan physical documentation into digital form and print physical copies of digital FCI. What technical control can be used to limit multi-function device (MFD) access to only the systems authorized to access the MFD?

A.

Virtual LAN restrictions

B.

Single administrative account

C.

Documentation showing MFD configuration

D.

Access lists only known to the IT administrator

Full Access
Question # 47

Two network administrators are working together to determine a network configuration in preparation for CMMC. The administrators find that they disagree on a couple of small items. Which solution is the BEST way to ensure compliance with CMMC?

A.

Consult with the CEO of the company.

B.

Consult the CMMC Assessment Guides and NIST SP 800-171.

C.

Go with the network administrator's ideas with the least stringent controls.

D.

Go with the network administrator's ideas with the most stringent controls.

Full Access
Question # 48

Which entity requires that organizations handling FCI or CUI be assessed to determine a required Level of cybersecurity maturity?

A.

DoD

B.

CISA

C.

NIST

D.

CMMC-AB

Full Access
Question # 49

Which domain has a practice requiring an organization to restrict, disable, or prevent the use of nonessential programs?

A.

Access Control (AC)

B.

Media Protection (MP)

C.

Asset Management (AM)

D.

Configuration Management (CM)

Full Access
Question # 50

When scoping a Level 2 assessment, which document is useful for understanding the process to successfully implement practices required for the various Levels of CMMC?

A.

NISTSP 800-53

B.

NISTSP 800-88

C.

NISTSP 800-171

D.

NISTSP 800-172

Full Access