Pass the Cyber AB CMMC CMMC-CCA Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions
Questions # 21:

An OSC allows some employees to use their personal devices (laptops, tablets) for work purposes. The OSC enforces a Bring Your Own Device (BYOD) policy that requires employees to install Mobile Device Management (MDM) software on their devices. The MDM allows for remotewiping of lost or stolen devices and enforces access control policies. Employees use VPNs to remotely access the OSC network from their personal devices. What challenges might a CCA face when collecting evidence to assess the OSC’s compliance with AC.L2-3.1.12 – Control Remote Access?

Options:

A.

The use of MDM software simplifies evidence collection on mobile device security configurations


B.

The use of VPNs ensures a secure connection regardless of the device used for remote access


C.

Privacy concerns arise due to the personal nature of BYOD devices


D.

The CCA can rely solely on employee attestation to verify compliance with the BYOD policy


Expert Solution
Questions # 22:

A representative of a CMMC Level 2 certified DoD contractor has reached out to you as a CCA for an explanation of FedRAMP equivalency. They want to use a Cloud Service Offering (CSO) from a renowned CSP, but in light of the DoD FedRAMP equivalency memo, they are reluctant. In your conversation, you learn that although the CSO has impressive features, the assessment by a FedRAMP 3PAO resulted in a Plan of Action and Milestones (POA&M) that the CSP is remedying. What is the main reason the contractor shouldn’t use the CSP’s services?

Options:

A.

The CSP has not closed out the POA&Ms


B.

The CSO is not DFARS 252.204-7019 compliant


C.

The CSO has not been given JAB P-ATO


D.

The CSO hasn’t fully met (100%) FedRAMP Moderate or equivalent baselines


Expert Solution
Questions # 23:

Prior to starting an assessment, an OSC must develop a data flow diagram. This diagram can then be used as a tool to help establish the context and boundaries of the CMMC assessment activities. What is critical to capture while developing the data flow diagram?

Options:

A.

The organization’s network topology and hardware configurations


B.

A list of all employees and their job functions


C.

The physical layout of the organization’s office spaces


D.

Business processes, subprocesses, and assets and systems used to support the process


Expert Solution
Questions # 24:

An OSC’s network diagram shows a separate network segment (192.168.50.0/24) designated for its engineering department. This segment restricts access to specific engineering resources. While the servers are physically located in a shared data center, the network configuration isolates them logically. Through which of the following does the network segmentation create isolation for the engineering department’s resources?

Options:

A.

Logical separation through network configuration


B.

Physical barriers within the data center


C.

Encryption of engineering data at rest


D.

Requirement of a security badge to access the data center


Expert Solution
Questions # 25:

CMMC practice SC.L2-3.13.6 assessment objectives [a] and [b] require contractors’ systems to deny network communications traffic by default [a] and allow network communications traffic by exception [b] respectively. As a CCA, you assess whether an OSC has segmented its network into different zones. The OSC has implemented Access Control Lists (ACLs) on its network devices to permit or deny traffic based on source and destination IP addresses and ports. Additionally, the OSC uses a Fortinet Next-Generation Firewall (NGFW). To monitor their computing environment, theOSC uses a state-of-the-art SIEM. Which of the following assessment methods is NOT a method you would use to assess whether the OSC has met assessment objectives [a] and [b]?

Options:

A.

Examine the ACL configurations on the network devices


B.

Observe the SIEM monitoring and logging capabilities


C.

Interview the system administrators about the organization’s network segmentation strategy


D.

Analyze the firewall rules and policy settings on the NGFW


Expert Solution
Questions # 26:

The DoD has awarded a defense contractor a contract to deliver next-gen jet engine parts. The order requires the contractor to submit the blueprints/CAD files within six months, and once they are validated, the contractor submits a production schedule. The contractor indicates that they should be able to deliver the components in three years. Which of the following is true about the dates and schedule of the engine components?

Options:

A.

They must be protected under NIST SP 800-171


B.

They must be properly marked and labeled


C.

They are part of the OSC’s CUI


D.

They must be protected in accordance with FAR 52.204-21


Expert Solution
Questions # 27:

A CCA is assessing an OSC that uses a complex multi-cloud architecture with resources distributed across multiple Cloud Service Providers (CSPs). During the evaluation, the CCA encounters challenges in verifying the authorization methods used for external connections to the various cloud resources (AC.L1-3.1.20). Additionally, the assessor finds limited documentation of the cryptographic mechanisms implemented to protect the confidentiality of remote access sessions (AC.L2-3.1.13) to cloud-based data. While the OSC has network monitoring tools in place, the sheer volume of data makes it difficult to identify and track specific remote access activities. What challenges might the CCA face while assessing the OSC’s cloud and hybrid environment for compliance with CMMC remote access requirements?

Options:

A.

Outdated network infrastructure and insufficient bandwidth


B.

Excessive focus on physical security measures while neglecting logical controls


C.

Difficulty verifying access control policies and lack of qualified personnel


D.

Difficulty in verifying external connection authorization methods and limited evidence of cryptographic mechanisms for remote access


Expert Solution
Questions # 28:

During a CMMC assessment, the CCAs, CCPs, and Lead Assessor validate the assessment scope provided by the OSC. They must review documents and records specific to the agreed-upon scope and boundaries of the assessment. There are several documents the Assessment Team may review or analyze; some are required, and others not. Which of the following documents is NOT required when scoping a CMMC Assessment for Level 2 maturity?

Options:

A.

Network diagrams


B.

System Security Plan (SSP)


C.

Preliminary List of Evidence


D.

System Design documentation


Expert Solution
Questions # 29:

As a CCA on a C3PAO Assessment Team, you have determined that the assessment scope provided by an OSC indicates plans to subcontract some elements of their contract to DelTech Inc. The OSC plans to bid on a DoD contract to develop guidance and targeting software. However, the software needs testing after installing a new surface-to-air defense system. Unfortunately, the OSC lacks themeans to test the software, which is where DelTech comes in. As a CCA, what must you do in this scenario?

Options:

A.

Inform the OSC that they cannot subcontract


B.

Assess DelTech Inc.’s CMMC compliance status


C.

Continue assessing the OSC’s implementation of the CMMC practices


D.

Confirm that the OSC has flowdown requirements in their subcontract with DelTech Inc. and that DelTech is CMMC Certified at a level commensurate with the risk of information they will handle


Expert Solution
Questions # 30:

The Cyber AB has completed an investigation into a report submitted by a CCA regarding a potential violation by another CCA. They have determined that the violation falls within the scope of the relevant Industry Working Group’s authority. What is the likely course of action for the Cyber AB in this scenario?

Options:

A.

Continue the investigation and make a final determination on the violation.


B.

Refer the incident to the relevant Industry Working Group for resolution, which may include remediation, coaching, or termination, with a right of appeal.


C.

Immediately suspend the CCA’s certification pending the working group’s resolution.


D.

Dismiss the investigation as it falls outside Cyber AB’s direct authority.


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions