Pass the Cyber AB CMMC CMMC-CCA Questions and answers with CertsForce

Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions
Questions # 111:

You are assessing an OSC that develops applications handling Controlled Unclassified Information (CUI). As part of the assessment, you review their vulnerability scanning process. According to their risk assessment policy, the OSC conducts system vulnerability scans every three months. However, they also utilize a centralized, automated vulnerability scanning tool that performs daily scans. Upon discovering any vulnerabilities, the OSC’s team applies patches and rescans their systems. Their environment includes backend database servers, web applications with custom Java code, virtual machine hosts running containerized applications, network firewalls, routers, switches, and developer workstations. During the assessment, you find that their scanning solution integrates the latest vulnerability feeds from the National Vulnerability Database (NVD), Open Vulnerability and Assessment Language (OVAL), and vendor sources. The tool generates reports using Common Vulnerability Scoring System (CVSS) metrics, and even remotely connected developer laptops are included in the scans. However, upon reviewing the vulnerability reports, you observe that the same high/critical vulnerabilities persist month after month without evidence of remediation.Furthermore, there is no record of source code scanning for their custom applications, and virtual machine hosts running the containerized applications are not included in the scans. Which of the following would be an appropriate compensating control or mitigation for the lack of source code scanning?

Options:

A.

Deploy web application firewalls in front of the custom applications


B.

Increase the frequency of automated vulnerability scans on the production environment


C.

Perform periodic penetration testing and code reviews on the custom applications


D.

Implement secure coding standards and practices during application development


Expert Solution
Questions # 112:

A contractor has retained you to assess compliance with CMMC practices as part of their triennial review. During your assessment of the AU domain, you discovered that the contractor has recently installed new nodes and servers on their network infrastructure. To assess their implementation of AU.L2-3.3.7 – Authoritative Time Source, you trigger some events documented to meet AU.L2-3.3.1 – System Auditing across both the new and existing systems, generating audit logs. Upon examining these logs, you notice inconsistencies in the timestamps between newly installed and previously existing nodes. Further investigation reveals that while the contractor has implemented a central Network Time Protocol (NTP) server as the authoritative time source, the new systems are configured to automatically adjust and synchronize their clocks only when the time difference with the NTP server exceeds 30 seconds. Based on this scenario, why is time synchronization with the NTP server necessary, and what is the recommended synchronization time?

Options:

A.

To ensure that all systems record the audit logs using the same time source, with a recommended synchronization time of 1 second


B.

To allow users to set their preferred time zones on individual systems, with a recommended synchronization time of 24 hours


C.

To reduce the network bandwidth used by system clocks, with a recommended synchronization time of once a month


D.

To increase the accuracy of digital clocks on devices, with a recommended synchronization time of 1 week


Expert Solution
Questions # 113:

When examining a contractor's access control policy and SSP, you observe that system administrators routinely use accounts with elevated privileges for checking email and browsing internal websites. What CMMC practice does this violate?

Options:

A.

AC.L2-3.1.7


B.

AC.L2-3.1.6


C.

AC.L2-3.1.4


D.

AC.L2-3.1.2


Expert Solution
Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions