Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

CMMC-CCA Certified CMMC Assessor (CCA) Exam Questions and Answers

Questions 4

Both FCI and CUI are stored by an OSC on the same network. Server A contains file shares with FCI, and Server B contains file shares with CUI. The OSC hopes each server would only undergo the assessment for the classification of data it contains. What is the MOST correct assessment situation in this scenario?

Options:

A.

Due to the presence of CUI on the network, a Level 2 certification is required for the network

B.

Server A may undergo a Level 1 self-assessment, while Server B must obtain a Level 2 certification

C.

Due to the presence of FCI on the network, only a Level 1 self-assessment is required for the network

D.

The network must be segmented to separate FCI from CUI before any assessments can be conducted

Buy Now
Questions 5

A company has multiple sites with employees at each site that must access the company’s CUI network from their remote locations. The company has set up a single access point for all employees to access the network. What is the MOST significant factor in determining whether the security on this single access point is adequate?

Options:

A.

Remote access is secured and monitored.

B.

Physical access is monitored and controlled.

C.

The security requirements for CUI and FCI are documented.

D.

The remote personnel have notification procedures regarding connection issues.

Buy Now
Questions 6

The assessment team is discussing the pre-assessment scope with an OSC. The OSC would like to limit the scope of the security requirements in environments that contain FCI and/or CUI. In this case, the OSC should:

Options:

A.

Request a single CMMC certification for both activities

B.

Choose to conduct two separate CMMC certification activities

C.

Define an Assessment Scope for those assets that process, store, or transmit FCI

D.

Define a CMMC Self-Assessment Scope for only those assets that process, store, or transmit CUI

Buy Now
Questions 7

An OSC is undergoing CMMC Assessment on an enterprise-wide basis. While walking to the conference room, the Assessor notices a printer repair technician in the hallway, unescorted, repairing a printer marked “Authorized for CUI printing.” What is the NEXT step the Lead Assessor should take regarding PE.L2-3.10.3: Escort Visitors?

Options:

A.

Make a note and score the practice as MET

B.

Ask the printer technician to leave immediately

C.

Make a note and score the practice as NOT MET

D.

Ask the OSC if the printer technician has authorized access

Buy Now
Questions 8

During a company’s assessment, the CCA notices that the server room door is kept open with a fan in the entryway because the cooling system is inadequate and the machines are overheating. According to the physical protection policy, the server room’s keypad is the mechanism for managing and controlling access to this equipment, and only the IT team should have access to the server room. However, with the door open, the keypad is not necessary, and anyone can enter the room.

The CCA asks the IT manager how access to this room is protected while the door is open. Which response would allow the company to still meet the physical security requirement?

Options:

A.

“Only employees are allowed in this area.”

B.

“We trust our employees not to enter the room if they are not supposed to.”

C.

“The server is located inside another room that only the IT team has access to.”

D.

“The CEO emailed all employees that the server room door would be kept open but only the IT team should enter.”

Buy Now
Questions 9

When preparing for an assessment, the assessor determines that the client’s proprietary data resides within an enclave. However, the assessor is unable to review policies containing proprietary data onsite and plans to have the policies copied on removable media by the client’s IT staff, whom they are scheduled to interview. What should the assessor consider as part of their planning?

Options:

A.

No proprietary data can leave the client’s environment under any circumstances.

B.

The assessor can transmit data outside the client’s environment if the client’s IT support staff grants access.

C.

No proprietary data can leave the client’s environment without the express written consent of the OSC POC.

D.

No proprietary data can leave the client’s environment without the express written consent of the OSC Assessment Official.

Buy Now
Questions 10

An Assessment Team is holding a discussion with the system administrator at the OSC to understand their process for ensuring unauthorized users are not able to access CUI.

Which assessment method is being utilized?

Options:

A.

Test method

B.

Observe method

C.

Examine method

D.

Interview method

Buy Now
Questions 11

While scoring the evidence for a particular CMMC practice, the Certified Assessor notes that one of the practice objectives is NOT MET, thereby scoring the entire practice as NOT MET. The OSC Assessment Official disagrees with the Certified Assessor’s decision, and they both take the dispute to the Lead Assessor, who is unable to resolve the issue to the OSC’s satisfaction.

How will this dispute be settled?

Options:

A.

The Lead Assessor is the final arbiter of the dispute.

B.

The OSC can supply adequate proof to the Cyber-AB to overturn the decision.

C.

The Certified Assessor is certified and, as such, the decision will stand.

D.

The Lead Assessor will present the dispute to the C3PAO Official, who will make a ruling.

Buy Now
Questions 12

The Lead Assessor is ready to complete planning by developing the assessment schedule. The Lead Assessor and the OSC Assessment Official discuss the Assessment Team members.

What MUST be submitted to the Cyber-AB before the assessment?

Options:

A.

Individual travel plans

B.

Non-disclosure agreements

C.

Verified NIST SP 800-171 assessor qualifications

D.

Absence of Conflict of Interest and Confirmation Statement

Buy Now
Questions 13

An OSC seeking Level 2 certification has recently configured system auditing capabilities for all systems within the assessment scope. The audit logs are generated based on the required events and contain the correct content that the organization has defined.

Which of the following BEST describes the next system auditing objective that the organization should define?

Options:

A.

Centralized audit log collection

B.

Integration of all system audit logs

C.

Review and update of logged events

D.

Retention requirements for audit records

Buy Now
Questions 14

When assessing an environment, the CCA determines that CUI is contained within an IoT device. Which statement MUST be true?

Options:

A.

The IoT device is a Contractor Risk Managed Asset.

B.

The IoT device must be accurately documented within the SSP.

C.

An IoT device may not be utilized to process, store, or transmit CUI.

D.

Access provisioned to the IoT device must be done in accordance with AC.L2-3.1.1: Limit System Access.

Buy Now
Questions 15

A company receives data that they suspect is CUI, but it is not marked as such. What is an acceptable way for the company to handle unmarked potential CUI?

Options:

A.

Treat all data as CUI even if not marked.

B.

If data are not marked, then they are not CUI.

C.

Have a procedure for deleting unlabeled data.

D.

Have a procedure for proper handling of unlabeled data.

Buy Now
Questions 16

While conducting a Level 2 Assessment, the Assessment Team begins reviewing assessment objects. The team identifies concerns with several of the objects presented. Which artifacts would require the MOST verification?

Options:

A.

Current artifacts produced by individuals performing the work

B.

Artifacts created 18 months ago by individuals performing the work

C.

Current artifacts produced by individuals that work for a separate entity of the company

D.

Artifacts created 18 months ago by individuals that work for a separate entity of the company

Buy Now
Questions 17

An OSC has a minimal physical footprint consisting only of network equipment, workstations, and a centralized domain environment. File storage is centralized in a third-party vendor’s FedRAMP Moderate authorized cloud environment, and employees access files using the cloud integration with their workstations. Since CUI is stored in the FedRAMP Moderate authorized environment, the OSC should prepare to have which environment(s) assessed?

Options:

A.

Cloud environment only

B.

OSC’s physical network only

C.

Cloud environment and the OSC’s physical network

D.

OSC’s physical network, the cloud environment, and the cloud vendor’s employee network

Buy Now
Questions 18

During an assessment, an assessor is trying to determine if the organization provides protection from malicious code at appropriate locations within organizational information systems. The assessor has decided to use the Interview method to gather evidence. It is BEST to interview:

Options:

A.

System developers

B.

System or network administrators

C.

Personnel with audit and accountability responsibilities

D.

Personnel with security alert and advisory responsibilities

Buy Now
Questions 19

During an assessment, the OSC person being interviewed explains the process for escorting visitors. The individual states that while all visitors are escorted, occasionally a vendor may need access to a small room with only one door and limited standing room. In these cases, the escort sits outside the room and observes the vendor completing the work. Is this practice in line with the escort policy?

Options:

A.

No, the escort is not allowed to sit down

B.

No, the escort must always be in the same room

C.

Yes, since the visitor can only use a single entry

D.

Yes, so long as the visitor’s actions can still be viewed by the escort

Buy Now
Questions 20

The audit team is discussing the OSC’s Risk Managed Assets. For these types of assets, the contractor need NOT:

Options:

A.

Provide a network diagram of the assessment scope.

B.

Ensure they are included in the pre-assessment discussion.

C.

Prepare for the assets to be assessed against CMMC practices.

D.

Show how they are being managed using organizational security policies.

Buy Now
Questions 21

A CCA is conducting an interview with an OSC team member about an offering from a well-known Cloud Service Provider (CSP). The offering is known to be secure, but the OSC has not provided evidence and the person being interviewed is unsure how the offering works. Will this offering be accepted by the Assessment Team?

Options:

A.

Yes, because of the process of reciprocity

B.

No, the OSC failed to train on the offering

C.

No, because the OSC lacks adequate and sufficient evidence

D.

Yes, because the CSP offering is a well-known, secure offering

Buy Now
Questions 22

An OSC processes data in its owned data center. The data center includes a very early smoke detection apparatus (VESDA). The apparatus only captures log information from its sensors around the data center. It is not intended, nor capable of, processing CUI. The VESDA is on a separate VLAN and is in a separate locked room in the data center.

Should the assessor agree that the VESDA is out-of-scope?

Options:

A.

Yes. The VESDA is physically and logically separated from the other data center equipment, and it is not intended nor capable of processing CUI.

B.

No. Even though the sensors are out-of-scope, the VESDA could provide access to the outside network if sensors were misused, and CUI could be exfiltrated.

C.

No. Even though the VESDA controller is in a locked room and on a separate VLAN, the VESDA is an essential security function as an early warning system.

D.

Yes. The VESDA serves a non-data processing purpose and is only connected to sensors. Sensors are out-of-scope, so the VESDA is out-of-scope.

Buy Now
Questions 23

The Lead Assessor is planning to conduct an assessment for an OSC. The Assessor has been given a preliminary asset inventory list by the OSC. How would the Lead Assessor determine if any assets are out-of-scope for the assessment?

Options:

A.

All assets in an OSC’s inventory fall within the scope of the assessment and, as such, should be assessed against the CMMC practices.

B.

None of the assets in an OSC’s inventory fall within the scope of the assessment and, as such, should not be assessed against the CMMC practices.

C.

Assets cannot process, store, or transmit CUI because they are physically or logically separated from CUI assets, or they are inherently unable to do so.

D.

Out-of-Scope Assets can process, store, or transmit CUI because they do not need to be physically or logically separated.

Buy Now
Questions 24

In order to assess whether an OSC meets AC.L2-3.1.5: Least Privilege, what should be examined by the Assessor?

Options:

A.

Authentication policy

B.

System configurations for all systems

C.

User access lists that identify privileged users

D.

List of terminated employees over the last three months

Buy Now
Questions 25

An OSC has a hardware and software list used to manage company assets. Which is the BEST evidence to show the OSC is managing the system baseline?

Options:

A.

Media protection

B.

Physical protection

C.

Configuration management

D.

Identification and authentication policy

Buy Now
Questions 26

The OSC POC has prepared evidence from an internal pre-assessment for the C3PAO in preparation for a third-party assessment. The OSC POC has identified that there are several ESPs (External Service Providers) involved in protecting the security of the infrastructure. While reviewing the pre-assessment documentation regarding ESPs, the Lead Assessor will be looking for items that are:

Options:

A.

Noted as inherited

B.

Marked as requiring a waiver

C.

Marked as NOT APPLICABLE

D.

Noted as partially implemented

Buy Now
Questions 27

In completing the assessment of practices in the Access Control (AC) domain, a CCA scored AC.L2-3.1.15: Privileged Remote Access as NOT MET. The OSC was notified of this deficiency at the end of day two of the assessment. On day five of the assessment, the OSC’s Assessment Official contacted the CCA to provide evidence that the deficiencies have been corrected.

What is the CCA’s NEXT step?

Options:

A.

This practice is not eligible for deficiency correction and should be scored as NOT MET.

B.

This practice is not eligible for deficiency correction, should be scored as NOT MET, and reevaluated during a POA&M Close-Out Assessment.

C.

This practice is eligible for deficiency correction and should be scored as MET but must be reevaluated during a POA&M Close-Out Assessment.

D.

This practice is eligible for deficiency correction, should be scored as NOT MET, and evaluated during the Limited Deficiency Correction evaluation.

Buy Now
Questions 28

When a CCA is assessing a control through Examine, what MUST they meet?

Options:

A.

Documents utilized for review must be in their mailed form

B.

Documents must be policy, process, and procedure documents

C.

Training materials reviewed can be in-process as they are for educational purposes

D.

System-level, network, and data flow diagrams must be completed in draft format

Buy Now
Questions 29

An OSC seeking Level 2 certification is working with an ESP. The organization is trying to determine if the ESP is considered within the assessment and is reviewing the Service Level Agreement (SLA) between the organization and the ESP. Which SLA component should be taken into consideration to determine if the ESP is within the assessment scope?

Options:

A.

Services

B.

Intervals

C.

Penalties

D.

Measurements

Buy Now
Questions 30

The Lead Assessor is conducting an assessment for an OSC. The Lead Assessor has finished collecting and examining evidence from the assessment.

Based on this information, what is the NEXT logical step?

Options:

A.

Develop an assessment plan.

B.

Deliver recommended assessment results.

C.

Generate final recommended assessment results.

D.

Determine and record initial practice scores.

Buy Now
Questions 31

In order to perform an interview, the Lead Assessor MUST ensure interview questions are:

Options:

A.

Yes/no questions

B.

Asked by any member of the OSC’s team

C.

Asked to those who implement, perform, or support the practices

D.

Asked with multiple people simultaneously to limit the number of interviews needed

Buy Now
Questions 32

Different mechanisms can be used to protect information at rest. Which mechanism is MOST LIKELY to afford protection for information at rest?

Options:

A.

Patching

B.

File share

C.

Secure offline storage

D.

Cryptographic mechanisms

Buy Now
Questions 33

A C3PAO is conducting a Level 2 assessment of a midsized construction contractor that does both private (commercial) and federal work. The contractor’s documentation states that all CUI flows through a single building on their office campus and is logically, physically, and administratively isolated from the rest of the environment. Why might an assessor request access to assess controls within a building or area not listed as in-scope in the documentation?

Options:

A.

If the assessor sees personnel carrying locked cases into the other building or area

B.

If the OSC has an underground passageway connecting the CUI building to a non-CUI building

C.

If network diagrams indicate the commercial and federal sectors share a single Internet connection

D.

If Human Resources that supports both commercial and federal sectors sits in the other building or area

Buy Now
Questions 34

During discussions with an OSC, the assessment team learned that many employees often need to work from remote locations and, as a result, are permitted to access the organization’s internal networks from those remote locations. To ensure secure remote access requirements are being met, remote access sessions need NOT be:

Options:

A.

Validated

B.

Identified

C.

Permitted

D.

Controlled

Buy Now
Questions 35

An Assessor is evaluating controls put in place by an OSC to restrict the use of privileged accounts. The Assessor interviews privileged users and confirms that the OSC has both a policy and specific procedures governing the use of privileged accounts for security functions. What else could the Assessor evaluate to validate the assertions made by the interviewed OSC staff?

Options:

A.

Examine the system architecture of the OSC to identify privileged accounts

B.

Test the processes for non-privileged accounts to perform privileged functions

C.

Examine the procedure assigning privileged roles to non-privileged functions

D.

Test the processes for privileged accounts with privileged users

Buy Now
Questions 36

A CCA is assessing the implementation of the Incident Reporting practice. To validate the control, what MUST the CCA ensure about the OSC?

Options:

A.

Incidents are tracked and documented

B.

Incident sources are configured and tuned

C.

Law enforcement officials are automatically notified during an incident

D.

Forensic investigations are performed to determine the impact of the incident

Buy Now
Questions 37

In an effort to understand whether the OSC appropriately defined the scope to exclude items that should not be assessed, which description does NOT belong in the scope?

Options:

A.

Data center in another state used by the OSC

B.

A smoke detector that is connected to the OSC network

C.

The SIEM tool used by the managed service provider in managing the OSC

D.

The office where its managed service provider’s management office is located

Buy Now
Questions 38

While examining evidence, a CCA is trying to confirm the claim that the OSC has identified all information system users, processes acting on behalf of users, and all devices.

Which of the following provides the STRONGEST evidence of this practice?

Options:

A.

Lists of system accounts and devices and system audit logs and records

B.

System design documentation and other relevant documents or records

C.

Procedures addressing user and system identification and authentication and SSP

D.

Identification and authentication policy and system configuration settings and associated documentation

Buy Now
Questions 39

While conducting a CMMC Level 2 Assessment for a small waveguide manufacturer, the client provides a copy of their CMMC Level 1 Self-Assessment that their senior official has recently approved and uploaded to the Supplier Performance Risk System (SPRS). What type of information may be covered within the Level 1 Self-Assessment that is OUTSIDE the scope of a Level 2 assessment?

Options:

A.

CUI in paper format

B.

FCI within the CUI production enclave

C.

FCI data within the description in the contractor self-assessment

D.

Sensitive Compartmented Information (SCI) shredded by an approved vendor

Buy Now
Questions 40

An Assessor is examining documents provided by the OSC POC. While reviewing them, the Assessor notes that several of the procedures have very current dates while the bulk do not. What should the Assessor do in order to decide if these new documents are acceptable as evidence?

Options:

A.

Ensure the documents were approved by a senior-level manager.

B.

Determine the outlined reasonableness of the procedures.

C.

Determine if the people involved in writing the procedures are on the list of those who can be interviewed.

D.

Set up an observation session to determine if the procedures are in use and people are knowledgeable of their deployment and use.

Buy Now
Questions 41

A company employs an encrypted VPN to enhance confidentiality over remote connections. The CCA reads a document describing the VPN. It states the VPN allows automated monitoring and control of remote access sessions, helps detect cyberattacks, and supports auditing of remote access to ensure compliance with CMMC requirements.

What document is the CCA MOST LIKELY reviewing to see how these VPNs are controlled and monitored?

Options:

A.

Access Control Policy

B.

Media Protection Policy

C.

Audit and Accountability Policy

D.

Configuration Management Policy

Buy Now
Questions 42

The OSC has changed its manner of operations in the past year to isolate its manufacturing division (which handles CUI) from its managerial team (which does not). Upon review of the provided information, the Lead Assessor was unable to identify this isolation in the environment. Which step should the Assessor take NEXT to understand how the current documentation isolates the operational components?

Options:

A.

Review the network or topology diagrams

B.

Review the change tickets and inventory updates

C.

Review the SSP

D.

Review to confirm the baseline configurations exist

Buy Now
Questions 43

An OSC leases several servers and rack space in a FedRAMP MODERATE authorized colocation data center. Additional servers operate in a LAN room within the company’s facility. Both facilities are within the OSC’s assessment boundary. In order to assess the physical protection of the environment, the Assessor MUST physically examine the visitor and access controls in place in the:

Options:

A.

Data center

B.

OSC’s facility

C.

OSC’s facility and the data center

D.

OSC’s facility and the data center’s customer relationship management regarding physical security

Buy Now
Questions 44

An OSC has built an enclave for its production environment. The enclave sits behind a firewall, with all equipment connected through a switch. There is a shipping workstation and physically connected label printer (used for the sales system, which does not process CUI) that the OSC claims are Contractor Risk Managed Assets (CRMA). Other than showing that the shipping workstation and label printer are not intended to store or transmit CUI, and documenting them in the SSP,

how BEST would the OSC show that the shipping workstation and label printer are Contractor Risk Managed Assets?

Options:

A.

Document in the asset inventory and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

B.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using vendor-recommended risk-based security practices; and include them in the network diagram.

C.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using the organization’s risk-based security policies and procedures; and include them in the network diagram.

D.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using industry risk-based security best practices; and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

Buy Now
Questions 45

An OSC seeking Level 2 certification is reviewing the physical security of their building. Currently, the building manager unlocks and locks the doors for business operations. The OSC would like the ability to automatically unlock the door for authorized personnel, track access individually, and maintain access history for all personnel. The BEST approach is for the OSC to:

Options:

A.

Maintain a list of authorized personnel and assign them a building key.

B.

Maintain security cameras to continuously monitor access to the building.

C.

Install a badge system and require each individual to use their badge to gain entry to the building.

D.

Install a keypad system and require the entry code to be changed when an individual leaves the company.

Buy Now
Exam Code: CMMC-CCA
Exam Name: Certified CMMC Assessor (CCA) Exam
Last Update: Aug 31, 2025
Questions: 150
CMMC-CCA pdf

CMMC-CCA PDF

$25.5  $84.99
CMMC-CCA Engine

CMMC-CCA Testing Engine

$30  $99.99
CMMC-CCA PDF + Engine

CMMC-CCA PDF + Testing Engine

$40.5  $134.99