Cyber AB Certified CMMC Assessor (CCA) Exam CMMC-CCA Question # 5 Topic 1 Discussion

Cyber AB Certified CMMC Assessor (CCA) Exam CMMC-CCA Question # 5 Topic 1 Discussion

CMMC-CCA Exam Topic 1 Question 5 Discussion:
Question #: 5
Topic #: 1

During a CMMC Level 2 assessment, a CCA is evaluating whether the organization meets the requirement to “Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.” According to the CMMC requirement, the CCA must determine whether FIPS-validated cryptography is employed to protect the confidentiality of CUI. Which assessment procedure would the CCA most likely use to evaluate this requirement?


A.

Examine the cryptographic modules


B.

Interview personnel responsible for implementing cryptographic controls and review documentation of the organization’s cryptographic policies and procedures


C.

Observe the organization’s use of cryptographic controls in practice


D.

Examine validation certificates of the cryptographic modules used by the OSC


Get Premium CMMC-CCA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.