When are data and documents with legacy markings from or for the DoD required to be re-marked or redacted?
Which standard and regulation requirements are the CMMC Model 2.0 based on?
A server is used to store FCI with a cloud provider long-term. What is the server considered?
Which principles are included in defining the CMMC-AB Code of Professional Conduct?
During a Level 2 Assessment, the OSC has provided an inventory list of all hardware. The list includes servers, workstations, and network devices. Why should this evidence be sufficient for making a scoring determination for AC.L2-3.1.19: Encrypt CUI on mobile devices and mobile computing platforms?
Two assessors cannot agree if a certain practice should be rated as MET or NOT MET. Who should they consult to determine the final interpretation?
An assessor has been working with an OSC's point of contact to plan and prepare for their upcoming assessment. What is one of the MOST important things to remember when analyzing requirements for an assessment?
A Lead Assessor is presenting an assessment kickoff and opening briefing. What topic MUST be included?
The Lead Assessor interviews a network security specialist of an OSC. The incident monitoring report for the month shows that no security incidents were reported from OSC's external SOC service provider. This is provided as evidence for RA.L2-3.11.2: Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified. Based on this information, the Lead Assessor should conclude that the evidence is:
In the CMMC Model, how many practices are included in Level 2?