Cyber AB Certified CMMC Assessor (CCA) Exam CMMC-CCA Question # 94 Topic 10 Discussion

Cyber AB Certified CMMC Assessor (CCA) Exam CMMC-CCA Question # 94 Topic 10 Discussion

CMMC-CCA Exam Topic 10 Question 94 Discussion:
Question #: 94
Topic #: 10

After you ask to examine some audit records, the contractor's system administrator informs you that there is a process to follow before accessing them. The logs are hashed using SHA-512 algorithms, and the system administrator has to run an algorithm to recalculate the hashes for the audit records to verify their integrity before running a decryption algorithm to decrypt the data. Since this might take some time, you tour the facility while interviewing personnel with audit and accountability roles. You see an employee holding the door for another without using their physical access card. While interviewing the contractor's employees, you find that they can access all audit logging tools and tweak the settings according to their needs or requirements. Upon examining the contractor's access control policy, you realize they have not defined the measures to protect audit logging tools. Which of the following statements accurately describes the contractor's compliance with protecting audit logging tools from unauthorized access, modification, and deletion, as required by AU.L2-3.3.8 – Audit Protection?


A.

The contractor's compliance cannot be determined based on the information provided


B.

The contractor is partially compliant, as audit logging tools are protected by the same measures as audit information


C.

The contractor is fully compliant; employees can access audit logging tools to meet their requirements


D.

The contractor is not compliant, as there are no defined measures to protect audit logging tools from unauthorized access, modification, or deletion


Get Premium CMMC-CCA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.