Pass the Cyber AB CMMC CMMC-CCA Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

In order to assess whether an OSC meets AC.L2-3.1.5: Least Privilege, what should be examined by the Assessor?

Options:

A.

Authentication policy


B.

System configurations for all systems


C.

User access lists that identify privileged users


D.

List of terminated employees over the last three months


Expert Solution
Questions # 22:

In validating the OSC’s implementation of AC.L2-3.1.16: Wireless Access Authorization, the CCA observes various personal and non-enterprise devices connected to the OSC’s Wi-Fi. Because organizations handle wireless access differently, the CCA must locate evidence showing who has ultimate authority over wireless access. Which authority is acceptable for authorizing wireless access?

Options:

A.

The CEO mandating IT to add their personal phone to the company Wi-Fi


B.

A written policy executed by the CEO listing the pre-authorization requirements for Wi-Fi connectivity


C.

The CEO emailing the company instructing everyone to put personal devices on the company Wi-Fi


D.

A detailed document from the head of IT with instructions on how to connect to the guest Wi-Fi network


Expert Solution
Questions # 23:

A company has multiple sites with employees at each site that must access the company’s CUI network from their remote locations. The company has set up a single access point for all employees to access the network. What is the MOST significant factor in determining whether the security on this single access point is adequate?

Options:

A.

Remote access is secured and monitored.


B.

Physical access is monitored and controlled.


C.

The security requirements for CUI and FCI are documented.


D.

The remote personnel have notification procedures regarding connection issues.


Expert Solution
Questions # 24:

An assessor is reviewing whether an organization appropriately analyzed the security impact of a new release of an application. Which of the following documents is MOST useful for the assessor to review?

Options:

A.

A description of the change from the software vendor


B.

Change Control Board (CCB) meeting minutes and supporting documents


C.

System audit logs showing that the change occurred, when, and by whom


D.

A log of security incidents/issues after the change was implemented


Expert Solution
Questions # 25:

Both FCI and CUI are stored by an OSC on the same network. Server A contains file shares with FCI, and Server B contains file shares with CUI. The OSC hopes each server would only undergo the assessment for the classification of data it contains. What is the MOST correct assessment situation in this scenario?

Options:

A.

Due to the presence of CUI on the network, a Level 2 certification is required for the network


B.

Server A may undergo a Level 1 self-assessment, while Server B must obtain a Level 2 certification


C.

Due to the presence of FCI on the network, only a Level 1 self-assessment is required for the network


D.

The network must be segmented to separate FCI from CUI before any assessments can be conducted


Expert Solution
Questions # 26:

The Lead Assessor concludes that the OSC is not ready for the assessment. After the Readiness Assessment Review, the OSC and the Lead Assessor could choose to:

Options:

A.

Replan or cancel the assessment.


B.

Replan or reschedule the assessment.


C.

Proceed as planned or cancel the assessment.


D.

Proceed as planned or reschedule the assessment.


Expert Solution
Questions # 27:

During an assessment, the Assessment Team has identified, according to the SSP and network diagram, that there is a mission system that cannot be altered but that has privileged accounts which should have MFA applied. As it is not possible to deploy a typical type of MFA on the mission system, which of the following constitutes a sufficient second factor?

Options:

A.

VPN access to the mission system


B.

User access logs on the mission system


C.

Badge access to the mission system room


D.

Remote access logs on the mission system


Expert Solution
Questions # 28:

To meet AC.L2-3.1.5: Least Privilege, the following procedure is established:

    All employees are given a basic (non-privileged) user account.

    System Administrators are given a separate System Administrator account.

    Database Administrators are given a separate Database Administrator account.

Which steps should be added to BEST meet all of the standards for least privilege?

Options:

A.

4. Database Administrators use their Database Administrator accounts to perform privileged functions.

  5. All users use their basic account for non-privileged functions.


B.

4. Database Administrators use their Database Administrator accounts to perform privileged functions.

  5. Non-privileged users use their basic account for non-privileged functions.


C.

4. Database Administrators use the System Administrator accounts to perform privileged functions.

  5. All other users use their basic account for all authorized functions.


D.

4. Database Administrators use the System Administrator accounts to perform privileged functions.

  5. Non-privileged users use their basic account for all authorized functions.


Expert Solution
Questions # 29:

An OSC seeking Level 2 certification has recently configured system auditing capabilities for all systems within the assessment scope. The audit logs are generated based on the required events and contain the correct content that the organization has defined.

Which of the following BEST describes the next system auditing objective that the organization should define?

Options:

A.

Centralized audit log collection


B.

Integration of all system audit logs


C.

Review and update of logged events


D.

Retention requirements for audit records


Expert Solution
Questions # 30:

A Lead Assessor is conducting an assessment for an OSC. The Lead Assessor is collecting evidence regarding the OSC’s network separation techniques. Which technique would be considered a logical separation technique and would fall within the scope of the assessment?

Options:

A.

Data loss alerting configured at the edge of the network containing CUI assets


B.

Access limitation based on badge access assigned to employees based on role


C.

Role-based access control within a properly implemented identity and access management tool


D.

A proxy-configured firewall that prevents data from flowing along the physical connection path


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions