Pass the Cyber AB CMMC CMMC-CCA Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions
Questions # 81:

You are a CCA evaluating an OSC's proposed CMMC assessment scope when planning and preparing a CMMC assessment. The assessment scope is defined in CMMC Assessment Scope - Level 2. Which statement best defines the assessment scope according to CMMC guidelines?

Options:

A.

It focuses solely on the cybersecurity measures implemented within the organization.


B.

It includes the boundaries within an organization’s networked environment that contain all the assets that will be assessed.


C.

It encompasses the entire organization's IT infrastructure.


D.

It includes only the physical components of the information system.


Expert Solution
Questions # 82:

An aerospace company bids on a DoD contract that requires CMMC Level 2 compliance. The company has multiple divisions, but only the Manufacturing Division will work on the project. The Manufacturing Division has its own IT infrastructure and security policies, but it relies on the company’s centralized IT department for some administrative tasks. Which of the following is the Host Unit in this scenario?

Options:

A.

The Manufacturing Division


B.

The office environment


C.

The entire aerospace company


D.

The company’s centralized IT department


Expert Solution
Questions # 83:

An OSC plans to bid for a DoD contract to supply laser welding services to repair a fleet of unmanned aerial vehicles (UAVs). This requires them to be CMMC Level 2 certified since the information they will receive from the DoD is Controlled Technical Information (CTI). However,their repair and welding services require a Computer Numerical Control (CNC) machine to fabricate some crucial parts. Since the welding is mainly automated using robots, the OSC has intelligently integrated its SCADA system with Programmable Logic Controllers (PLCs) for increased accuracy, improved safety and efficiency, and enhanced flexibility. As the Lead Assessor for the C3PAO Assessment Team validating the OSC’s CMMC assessment scope, you expect the OSC to handle the SCADA system, PLCs, and CNC machines in all the following ways EXCEPT?

Options:

A.

Categorize them as CUI assets.


B.

Document these assets in the SSP to show they are managed using the OSC’s risk-based security policies, procedures, and practices.


C.

Provide a network diagram of the assessment scope (to include these assets) to facilitate scoping discussions during the pre-assessment.


D.

Document these assets in the asset inventory.


Expert Solution
Questions # 84:

As a Lead Assessor, you are in contact with the OSC Assessment Official. The Assessment Official has submitted a document that outlines the scope of your assessment engagement. You expect to find all the following elements on the Assessment Scope document, EXCEPT?

Options:

A.

Assessment boundaries based on FCI/CUI locations and data flow


B.

Storage locations of physical information


C.

Name of the HQ organization CEO


D.

Identified networks/network enclave, enterprise, department, or service


Expert Solution
Questions # 85:

An OSC specializing in developing directed energy systems plans to bid on a DoD contract to produce a 250kW High Energy Laser Weapon System (HELWS). This system is to be deployed on military bases across the globe to protect U.S. servicemen against aerial threats, including mortars, rockets, and unmanned aerial vehicles (UAVs), as well as swarms of mini-UAVs. Because of the sensitivity of the information, the OSC has prohibited using emails to transmit information regarding the project, whether encrypted or otherwise. They also have instituted procedures to remove CUI from the email system. What CMMC assessment requirements must the Assessment Team follow regarding the OSC’s email system?

Options:

A.

Since there are measures in place to prevent CUI transfer through email, the email system is out of scope and there is no need to assess it against CMMC practices.


B.

The Assessment Team must assess the email system against all CMMC practices.


C.

Review the SSP in accordance with practice CA.L2-3.12.4 - System Security Plan.


D.

Review the SSP in accordance with CA.L2-3.12.4 - System Security Plan and assess against other CMMC practices.


Expert Solution
Questions # 86:

A defense contractor has a complex network design with multiple VLANs. The network is divided into three VLANs: VLAN 10 for the administrative offices, VLAN 20 for the engineering department, and VLAN 30 for the manufacturing floor. The company’s System Security Plan states that VLANs are used to create logical network segments and improve security. A Layer 3 switch is responsible for routing traffic between the VLANs, and the switch is configured to allow any type of traffic between the VLANs. How should VLANs be treated when defining the contractor’s CMMC Assessment Scope?

Options:

A.

Do not include any VLAN in the CMMC assessment scope.


B.

Include them in the CMMC Assessment Scope.


C.

Include only VLAN 30 in the CMMC assessment scope as it directly interacts with CUI.


D.

Include only VLAN 20 and VLAN 30 in the assessment scope.


Expert Solution
Questions # 87:

An OSC employs guards to protect the manufacturing shop where the magnetic radar-absorbing coating is manufactured. The Army uses this specific coating for a particular fleet of unmanned aerial vehicles (UAVs). The facility is under constant surveillance with the help of HD CCTVs. Within the OSC’s facilities is a Vector Network Analyzer (VNA) that measures the reflection and transmission properties of the coating over a range of frequencies. Guards protect the OSC’s anechoic chamber, and anyone entering must use an iris scanner and sign a physical form detailing their name and reason for being there. At the door is a huge sign reading “Authorized Personnel Only.” The OSC has implemented the following physical separation methods to secure its facilities, EXCEPT?

Options:

A.

Signage


B.

Monitoring


C.

Biometric locks


D.

Guards


Expert Solution
Questions # 88:

A Defense Contractor is preparing for their upcoming CMMC Level 2 assessment. One of the key controls they need to address is CMMC practice MP.L2-3.8.5 – Media Accountability, which deals with maintaining accountability for media containing CUI during transport outside of controlled areas. The organization regularly needs to transport physical media, such as hard drives and backup tapes, between their primary data center and an off-site storage facility. In the past, they have simply used standard packaging and commercial shipping services to move this media. Which of the following is NOT an assessment method for MP.L2-3.8.5 – Media Accountability?

Options:

A.

Testing mechanisms supporting or implementing media storage and media protection


B.

Examining designated controlled areas


C.

Interviewing organizational processes for storing media


D.

Examining procedures addressing media storage and access control policy


Expert Solution
Questions # 89:

When assessing a contractor’s implementation of CMMC practices, you examine its System Security Plan (SSP) to identify its documented measures for audit reduction and reporting. They have a dedicated section in their SSP addressing the Audit and Accountability requirements. You proceed to interview their information security personnel, who informed you that the contractor has a dedicated Security Operations Center (SOC) and uses Splunk to reduce and report audit logs. What key features regarding the deployment of Splunk for AU.L2-3.3.6 – Reduction & Reporting would you be interested in assessing?

Options:

A.

Ensure that Splunk is configured with appropriate RBAC to restrict access to log data, reports,and dashboards, ensuring that only authorized personnel can view or modify audit logs


B.

Ensure Splunk can retain audit records for a protracted amount of time


C.

Ensure that Splunk employs various filter rules for reducing audit logs to eliminate non-essential data and processes to analyze large volumes of log files or audit information, identifying anomalies and summarizing the data in a format more meaningful to analysts, thus generating customized reports


D.

Ensure Splunk can support compliance dashboards that provide real-time visibility into CMMC compliance status


Expert Solution
Questions # 90:

During your assessment of Defcon's (a contractor) implementation of CMMC Level 2 practices, you notice that their system for displaying security and privacy notices is insufficient. The banners currently in use lack detailed information about Controlled Unclassified Information (CUI)handling requirements and associated legal implications. Additionally, the banners are not consistently displayed across all contractor systems and workstations. Moreover, the banners on login pages disappear automatically after less than 5 seconds, providing insufficient time for users to read and acknowledge the content. Once the inconsistencies are addressed, when should the contractor’s privacy and security notice be displayed?

Options:

A.

Only during the initial system logon


B.

During the initial system logon and when accessing specific CUI-related applications and data


C.

Only when handling or processing export-controlled technical data


D.

Continuously on all systems and workstations, regardless of user activity


Expert Solution
Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions