Pass the Cyber AB CMMC CMMC-CCP Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

SC.L2-3 13.14: Control and monitor the use of VoIP technologies is marked as NOT APPLICABLE for an OSC's assessment. How does this affect the assessment scope?

Options:

A.

Any existing telephone system is in scope even if it is not using VoIP technology.


B.

An error has been made and the Lead Assessor should be contacted to correct the error.


C.

VoIP technology is within scope, and it uses FlPS-validated encryption, so it does not need to be assessed.


D.

VoIP technology is not used within scope boundary, so no assessment procedures are specified for this practice.


Expert Solution
Questions # 32:

Which authority leads the CMMC direction, standards, best practices, and knowledge framework for how to map the controls and processes across different Levels that range from basic cyber hygiene to advanced cyber practices?

Options:

A.

NIST


B.

DoD CIO office


C.

Federal CIO office


D.

Defense Federal Acquisition Regulation Council


Expert Solution
Questions # 33:

Who is responsible for ensuring that subcontractors have a valid CMMC Certification?

Options:

A.

CMMC-AB


B.

OUSD A&S


C.

DoD agency or client


D.

Contractor organization


Expert Solution
Questions # 34:

A CMMC Level 1 Self-Assessment identified an asset in the OSC's facility that does not process, store, or transmit FCI. Which type of asset is this considered?

Options:

A.

FCI Assets


B.

Specialized Assets


C.

Out-of-Scope Assets


D.

Government-Issued Assets


Expert Solution
Questions # 35:

At which CMMC Level do the Security Assessment (CA) practices begin?

Options:

A.

Level 1


B.

Level 2


C.

Level 3


D.

Level 4


Expert Solution
Questions # 36:

Which standard of assessment do all C3PAO organizations execute an assessment methodology based on?

Options:

A.

ISO 27001


B.

NISTSP800-53A


C.

CMMC Assessment Process


D.

Government Accountability Office Yellow Book


Expert Solution
Questions # 37:

An OSC receives an email with "CUI//SP-PRVCY//FED Only" in the body of the message Which organization's website should the OSC go to identify what this marking means?

Options:

A.

NARA


B.

CMMC-AB


C.

DoD Contractors FAQ page


D.

DoD 239.7601 Definitions page


Expert Solution
Questions # 38:

Which term describes "the protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to. or modification of information"?

Options:

A.

Adopted security


B.

Adaptive security


C.

Adequate security


D.

Advanced security


Expert Solution
Questions # 39:

In the CMMC Model, how many practices are included in Level 2?

Options:

A.

17 practices


B.

72 practices


C.

110 practices


D.

180 practices


Expert Solution
Questions # 40:

What is the primary intent of the verify evidence and record gaps activity?

Options:

A.

Map test and demonstration responses to CMMC practices.


B.

Conduct interviews to test process implementation knowledge.


C.

Determine the one-to-one relationship between a practice and an assessment object.


D.

Identify and describe differences between what the Assessment Team required and the evidence collected.


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions