Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cyber AB CMMC CMMC-CCP Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

When are data and documents with legacy markings from or for the DoD required to be re-marked or redacted?

Options:

A.

When under the control of the DoD


B.

When the document is considered secret


C.

When a document is being shared outside of the organization


D.

When a derivative document's original information is not CUI


Expert Solution
Questions # 52:

Which standard and regulation requirements are the CMMC Model 2.0 based on?

Options:

A.

NIST SP 800-171 and NIST SP 800-172


B.

DFARS, FIPS 100, and NIST SP 800-171


C.

DFARS, NIST, and Carnegie Mellon University


D.

DFARS, FIPS 100, NIST SP 800-171, and Carnegie Mellon University


Expert Solution
Questions # 53:

A server is used to store FCI with a cloud provider long-term. What is the server considered?

Options:

A.

In scope, because the cloud provider will be storing the FCI data


B.

Out of scope, because the cloud provider stores the FCI data long-term


C.

In scope, because the cloud provider is required to be CMMC Level 2 certified


D.

Out of scope, because encryption is always used when the cloud provider stores the FCI data


Expert Solution
Questions # 54:

Which principles are included in defining the CMMC-AB Code of Professional Conduct?

Options:

A.

Objectivity, classification, and information accuracy


B.

Objectivity, confidentiality, and information integrity


C.

Responsibility, classification, and information accuracy


D.

Responsibility, confidentiality, and information integrity


Expert Solution
Questions # 55:

During a Level 2 Assessment, the OSC has provided an inventory list of all hardware. The list includes servers, workstations, and network devices. Why should this evidence be sufficient for making a scoring determination for AC.L2-3.1.19: Encrypt CUI on mobile devices and mobile computing platforms?

Options:

A.

The inventory list does not specify mobile devices.


B.

The interviewee attested to encrypting all data at rest.


C.

The inventory list does not include Bring Your Own Devices.


D.

The DoD has accepted an alternative safeguarding measure for mobile devices.


Expert Solution
Questions # 56:

Two assessors cannot agree if a certain practice should be rated as MET or NOT MET. Who should they consult to determine the final interpretation?

Options:

A.

C3PAO


B.

CMMC-AB


C.

Lead Assessor


D.

Quality Assurance Assessor


Expert Solution
Questions # 57:

An assessor has been working with an OSC's point of contact to plan and prepare for their upcoming assessment. What is one of the MOST important things to remember when analyzing requirements for an assessment?

Options:

A.

Scoping an assessment is easy and worry-free.


B.

The initial plan cannot be changed once agreed upon.


C.

There is a determined amount of time that the OSC's point of contact has to submit evidence and rough order-of-magnitude.


D.

Assessors need to continuously review and update the requirements and plan for the assessment as information is gathered.


Expert Solution
Questions # 58:

A Lead Assessor is presenting an assessment kickoff and opening briefing. What topic MUST be included?

Options:

A.

Gathering evidence


B.

Review of the OSC's SSP


C.

Overview of the assessment process


D.

Examination of the artifacts for sufficiency


Expert Solution
Questions # 59:

The Lead Assessor interviews a network security specialist of an OSC. The incident monitoring report for the month shows that no security incidents were reported from OSC's external SOC service provider. This is provided as evidence for RA.L2-3.11.2: Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified. Based on this information, the Lead Assessor should conclude that the evidence is:

Options:

A.

inadequate because it is irrelevant to the practice.


B.

adequate because it fits well for expected artifacts.


C.

adequate because no security incidents were reported.


D.

inadequate because the OSC's service provider should be interviewed.


Expert Solution
Questions # 60:

In the CMMC Model, how many practices are included in Level 2?

Options:

A.

17 practices


B.

72 practices


C.

110 practices


D.

180 practices


Expert Solution
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions