Pass the Cyber AB CMMC CMMC-CCA Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

The SSP for an OSC undergoing an assessment categorizes a device in the inventory that wirelessly connects to the network. In order to secure the connection of wireless devices that access a system that transmits, stores, or processes CUI, what are the requirements?

Options:

A.

Wireless access must be configured to use FIPS 140 validated cryptography.


B.

Wireless users must be vetted, and an Access Control List maintained for access to CUI.


C.

Wireless access must be configured to use FIPS 140 validated cryptography and limited to authenticated users.


D.

Wireless users must be specifically identified in network diagrams and configured to use FIPS 140 validated cryptography.


Expert Solution
Questions # 32:

While conducting a CMMC Level 2 gap analysis with a large defense contractor, a CMMC RP confirms that the organization uses a RADIUS server for authentication. What additional method could be used to comply with AC.L2-3.1.17: Wireless Access Protection?

Options:

A.

Layer 3 switch


B.

Intrusion detection solution


C.

WPA2-Enterprise encryption


D.

Frequency-hopping wireless access


Expert Solution
Questions # 33:

A company receives data that they suspect is CUI, but it is not marked as such. What is an acceptable way for the company to handle unmarked potential CUI?

Options:

A.

Treat all data as CUI even if not marked.


B.

If data are not marked, then they are not CUI.


C.

Have a procedure for deleting unlabeled data.


D.

Have a procedure for proper handling of unlabeled data.


Expert Solution
Questions # 34:

A cloud-native OSC uses a vendor’s FedRAMP MODERATE authorized cloud environment for all aspects of their CUI needs (identity, email, file storage, office suite, etc.) as well as the vendor’s locally installable applications. The OSC properly configured the vendor’s cloud-based SIEM system to monitor all aspects of the cloud environment. The OSC’s SSP documents SI.L2-3.14.7: Identify Unauthorized Use, defining authorized use and referencing procedures for identifying unauthorized use.

How should the Certified Assessor score this practice?

Options:

A.

NOT MET because logs from physical infrastructure are not captured by the SIEM.


B.

NOT MET because locally installable applications from a cloud-native environment are not allowed.


C.

MET because being cloud-native is a great way to contain risk to a vendor’s environment.


D.

MET because the cloud SIEM is configured to monitor all of the vendor’s cloud environment.


Expert Solution
Questions # 35:

Does CMMC Level 2 require that a Cloud Service Provider (CSP) hold a FedRAMP HIGH authorization hosted in a government community cloud (GCC)?

Options:

A.

No. The CSP can obtain a FedRAMP MODERATE equivalency.


B.

No. The CSP must hold a FedRAMP MODERATE authorization.


C.

Yes. FedRAMP HIGH is required for CUI data controls due to the sensitive nature of the Defense Industrial Base systems.


D.

Yes. FedRAMP HIGH authorization demonstrates the CSP compliance with NIST SP 800-53 and SP 800-171 control requirements.


Expert Solution
Questions # 36:

The Lead Assessor is reviewing the Assessment Plan to identify people for interviews regarding a specific Level 2 practice. Some OSC personnel previously interviewed provided only brief answers without meaningful verification. What can the Lead Assessor do to improve this situation going forward?

Options:

A.

Ensure the people from the training matrix are made available


B.

Ensure and verify confidentiality and non-attribution of responses


C.

Ensure the respondents sign a non-disclosure agreement for the OSC


D.

Ensure and verify the responses map to the documented artifacts


Expert Solution
Questions # 37:

The Lead Assessor is compiling the assessment results, which must contain the status for each of the applicable practices. Some practices have been placed in the limited practice deficiency correction program. Multiple areas have been reviewed, including HQ, host units, and a specific enclave.

In order to properly report the findings, the Lead Assessor MUST:

Options:

A.

Identify items that were moved to the POA&M.


B.

Confirm the final findings are aggregated to the OSC level.


C.

Record the agreements made with the OSC Assessment Official.


D.

Ensure the report includes all of the evidence that has been collected.


Expert Solution
Questions # 38:

A CCA is assessing the implementation of the Incident Reporting practice. To validate the control, what MUST the CCA ensure about the OSC?

Options:

A.

Incidents are tracked and documented


B.

Incident sources are configured and tuned


C.

Law enforcement officials are automatically notified during an incident


D.

Forensic investigations are performed to determine the impact of the incident


Expert Solution
Questions # 39:

The assessment team has divided responsibilities to review portions of the OSC’s scope, including the Host Unit, the specific enclave, and supporting teams such as a Managed Security Service Provider (MSSP). During evidence review, the team notices that MSSP personnel answered interview questions somewhat differently than OSC personnel. To clarify this inconsistency, the Lead Assessor decides to take all the following steps EXCEPT:

Options:

A.

Review the network diagrams.


B.

Review the agreement with the MSSP.


C.

Review the notes to determine what was different.


D.

Review interview questionnaire consistency.


Expert Solution
Questions # 40:

During the assessment of a company, the CCA learns that 50% of employees work from home using remote access. After reviewing the Access Control policy and audit logs, the CCA is unsure how the system ensures only employees with correct privileges can access CUI. The CCA decides a Test of functionality is required. Which question is of the LEAST concern to the CCA?

Options:

A.

Are remote access sessions necessary?


B.

Are remote access sessions permitted?


C.

Are remote access sessions monitored?


D.

Are the types of permitted remote access identified?


Expert Solution
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions