Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

CMMC-CCP Certified CMMC Professional (CCP) Exam Questions and Answers

Questions 4

According to DFARS clause 252.204-7012, who is responsible for determining that Information in a given category should be considered CUI?

Options:

A.

The NARA CUI Executive Agent

B.

The contractor who generated the information

C.

The DoD agency for whom the contractor is performing the work

D.

The military personnel assigned to the contractor for that purpose

Buy Now
Questions 5

Which code or clause requires that a contractor is meeting the basic safeguarding requirements for FCI during a Level 1 Self-Assessment?

Options:

A.

FAR 52.204-21

B.

22CFR 120-130

C.

DFARS 252.204-7011

D.

DFARS 252.204-7021

Buy Now
Questions 6

The Level 1 practice description in CMMC is Foundational. What is the Level 2 practice description?

Options:

A.

Expert

B.

Advanced

C.

Optimizing

D.

Continuously Improved

Buy Now
Questions 7

What technical means can an OSC have in place to limit individuals who are authorized to post or process information on publicly accessible systems?

Options:

A.

Enable cookies to track who has accessed certain websites.

B.

Ensure procedural documentation is in place on how to access website consoles.

C.

Ensure marketing team trainings are required so that any changes to the website go through proper review.

D.

Enable administrative access roles to those that need them so that only those people can post items to the website.

Buy Now
Questions 8

The evidence needed for each practice and/or process is weight for:

Options:

A.

adequacy and sufficiency.

B.

adequacy and thoroughness.

C.

sufficiency and thoroughness.

D.

sufficiency and appropriateness.

Buy Now
Questions 9

A member of the Assessment Team has been assigned the responsibility of maintaining and protecting information from the OSC. The Assessment Results Package, PCI, CUI, and any notes must be retained and protected from disclosure. To protect the OSC's information, which principle should be used, and for how long?

Options:

A.

Cryptography and hashing for 1 year

B.

Confidentiality and non-disclosure for 3 years

C.

Availability, confidentiality, and integrity for 1 year

D.

Authentication, authorization, and accounting for 3 years

Buy Now
Questions 10

Who makes the final determination of the assessment method used for each practice?

Options:

A.

CCP

B.

osc

C.

Site Manager

D.

Lead Assessor

Buy Now
Questions 11

Which principles are included in defining the CMMC-AB Code of Professional Conduct?

Options:

A.

Objectivity, classification, and information accuracy

B.

Objectivity, confidentiality, and information integrity

C.

Responsibility, classification, and information accuracy

D.

Responsibility, confidentiality, and information integrity

Buy Now
Questions 12

Which CMMC Levels focus on protecting CUI from exfiltration?

Options:

A.

Levels 1 and 2

B.

Levels 1 and 3

C.

Levels 2 and 3

D.

Levels 1, 2, and 3

Buy Now
Questions 13

Ethics is a shared responsibility between:

Options:

A.

DoD and CMMC-AB.

B.

OSC and sponsors.

C.

CMMC-AB and members of the CMMC Ecosystem.

D.

members of the CMMC Ecosystem and Lead Assessors.

Buy Now
Questions 14

An Assessment Team is reviewing a practice that is documented and being checked monthly. When reviewing the logs, the practice is only being completed quarterly. During the interviews, the team members say they perform the practice monthly but only document quarterly. Is this sufficient to pass the practice?

Options:

A.

No, the work is not being done as stated.

B.

Yes, the practice is being done as documented.

C.

No, all three assessment methods must be met to pass.

D.

Yes. the interview process is enough to pass a practice.

Buy Now
Questions 15

What is the LAST step when developing an assessment plan for an OSC?

Options:

A.

Verify the readiness to conduct the assessment.

B.

Perform certification assessment readiness review.

C.

Update the assessment plan and schedule as needed

D.

Obtain and record commitment to the assessment plan.

Buy Now
Questions 16

Which term describes a group of individuals that conduct operational network vulnerability evaluations and provide mitigation techniques to customers?

Options:

A.

Red team

B.

Blue team

C.

White hat hackers

D.

Penetration test team

Buy Now
Questions 17

During an assessment, the Lead Assessor reviews the evidence for each CMMC in-scope practice that has been reviewed, verified, rated, and discussed with the OSC during the daily reviews. The Assessment Team records the final recommended MET or NOT MET rating and prepares to present the results to the assessment participants during the final review with the OSC and sponsor. As a part of this presentation, which document MUST include the attendee list, time/date, location/meeting link, results from all discussed topics, including any resulting actions, and due dates from the OSC or Assessment Team?

Options:

A.

Final log report

B.

Final CMMC report

C.

Final and recorded OSC CMMC report

D.

Final and recorded Daily Checkpoint log

Buy Now
Questions 18

In the CMMC Model, how many practices are included in Level 1?

Options:

A.

15 practices

B.

17 practices

C.

72 practices

D.

110 practices

Buy Now
Questions 19

Two assessors cannot agree if a certain practice should be rated as MET or NOT MET. Who should they consult to determine the final interpretation?

Options:

A.

C3PAO

B.

CMMC-AB

C.

Lead Assessor

D.

Quality Assurance Assessor

Buy Now
Questions 20

Which assessment method describes the process of reviewing, inspecting, observing, studying, or analyzing assessment objects (i.e., specification, mechanisms, activities)?

Options:

A.

Test

B.

Assess

C.

Examine

D.

Interview

Buy Now
Questions 21

Which entity requires that organizations handling FCI or CUI be assessed to determine a required Level of cybersecurity maturity?

Options:

A.

DoD

B.

CISA

C.

NIST

D.

CMMC-AB

Buy Now
Questions 22

In scoping a CMMC Level 1 Self-Assessment, all of the computers and digital assets that handle FCI are identified. A file cabinet that contains paper FCI is also identified. What can this file cabinet BEST be determined to be?

Options:

A.

In scope, because it is an asset that stores FCI

B.

In scope, because it is part of the same physical location

C.

Out of scope, because they are all only paper documents

D.

Out of scope, because it does not process or transmit FCI

Buy Now
Questions 23

The Advanced Level in CMMC will contain Access Control (AC) practices from:

Options:

A.

Level 1

B.

Level 3

C.

Levels 1 and 2

D.

Levels 1, 2, and 3

Buy Now
Questions 24

On a Level 2 Assessment Team, what are the roles of the CCP and the CCA?

Options:

A.

The CCP leads the Level 2 Assessment Team, which consists of one or more CCAs.

B.

The CCA leads the Level 2 Assessment Team, which can include 3 CCP with US Citizenship.

C.

The CCA leads the Level 2 Assessment Team, which can include a CCP regardless of citizenship.

D.

The CCP leads the Level 2 Assessment Team, which can include a CCA. regardless of citizenship.

Buy Now
Questions 25

In performing scoping, what should the assessor ensure that the scope of the assessment covers?

Options:

A.

All assets documented in the business plan

B.

All assets regardless if they do or do not process, store, or transmit FCI/CUI

C.

All entities, regardless of the line of business, associated with the organization

D.

All assets processing, storing, or transmitting FCI/CUI and security protection assets

Buy Now
Questions 26

Prior to conducting a CMMC Assessment, the contractor must specify the CMMC Assessment scope by categorizing all assets. Which two asset categories are always assessed against CMMC practices?

Options:

A.

CUI Assets and Specialized Assets

B.

Security Protection Assets and CUI Assets

C.

Specialized Assets and Contractor Risk Managed Assets

D.

Security Protection Assets and Contractor Risk Managed Assets

Buy Now
Questions 27

Exercising due care to ensure the information gathered during the assessment is protected even after the engagement has ended meets which code of conduct requirement?

Options:

A.

Availability

B.

Confidentiality

C.

Information Integrity

D.

Respect for Intellectual Property

Buy Now
Questions 28

A client uses an external cloud-based service to store, process, or transmit data that is reasonably believed to qualify as CUI. According to DFARS clause 252.204-7012. what set of established security requirements MUST that cloud provider meet?

Options:

A.

FedRAMP Low

B.

FedRAMP Moderate

C.

FedRAMP High

D.

FedRAMP Secure

Buy Now
Questions 29

Which term describes the process of granting or denying specific requests to obtain and use information, related information processing services, and enter specific physical facilities?

Options:

A.

Access control

B.

Physical access control

C.

Mandatory access control

D.

Discretionary access control

Buy Now
Questions 30

The CMMC Level 2 assessment methods include examination and can include:

Options:

A.

documents, mechanisms, or activities.

B.

specific hardware, software, or firmware safeguards employed within a system.

C.

policies, procedures, security plans, penetration tests, and security requirements.

D.

observation of system backup operations, exercising a contingency plan, and monitoring network traffic.

Buy Now
Questions 31

Which example represents a Specialized Asset?

Options:

A.

SOCs

B.

Hosted VPN services

C.

Consultants who provide cybersecurity services

D.

All property owned or leased by the government

Buy Now
Questions 32

Which document is used to protect sensitive and confidential information from being made available by the recipient of that information?

Options:

A.

Legal agreement

B.

CMMC agreement

C.

Assessment agreement

D.

Non-disclosure agreement

Buy Now
Questions 33

SI.L2-3.14.7: Identify unauthorized use of organizational systems is being assessed using two assessment objectives. The assessment objectives are to determine if authorized use of the system is defined and to determine if unauthorized use of the system is identified. What is the BEST evidence for this practice?

Options:

A.

Risk response

B.

Risk assessment

C.

Incident response

D.

System monitoring

Buy Now
Questions 34

An assessor needs to get the most accurate answers from an OSC's team members. What is the BEST method to ensure that the OSC's team members are able to describe team member responsibilities?

Options:

A.

Interview groups of people to get collective answers.

B.

Understand that testing is more important that interviews.

C.

Ensure confidentiality and non-attribution of team members.

D.

Let team members know the questions prior to the assessment.

Buy Now
Questions 35

When assessing SI.L2-3.14.6: Monitor communications for attack, the CCA interviews the person responsible for the intrusion detection system and examines relevant policies and procedures for monitoring organizational systems. What would be a possible next step the CCA could conduct to gather sufficient evidence?

Options:

A.

Conduct a penetration test

B.

Interview the intrusion detection system's supplier.

C.

Upload known malicious code and observe the system response.

D.

Review an artifact to check key references for the configuration of the IDS or IPS practice for additional guidance on intrusion detection and prevention systems.

Buy Now
Questions 36

Which statement is NOT a measure to determine if collected evidence is sufficient?

Options:

A.

Evidence covers the sampled organization

B.

Evidence is not required if the practice is ISO certified

C.

Evidence covers the model scope of the Assessment (Target CMMC Level)

D.

Evidence corresponds to the sampled organization in the evidence collection approach

Buy Now
Questions 37

During the assessment process, who is the final interpretation authority for recommended findings?

Options:

A.

C3PAO

B.

CMMC-AB

C.

OSC sponsor

D.

Assessment Team Members

Buy Now
Questions 38

What service is the MOST comprehensive that the RPO provides?

Options:

A.

Training services

B.

Education services

C.

Consulting services

D.

Assessment services

Buy Now
Questions 39

During Phase 4 of the Assessment process, what MUST the Lead Assessor determine and recommend to the C3PAO concerning the OSC?

Options:

A.

Ability

B.

Eligibility

C.

Capability

D.

Suitability

Buy Now
Questions 40

In accordance with NARA directives and Chapter 33 of Title 44 (Records Management Directive), which types of data MUST have policies and procedures for disposal?

Options:

A.

All recorded digital documents

B.

All digital and recorded paper documents

C.

All digital documents and recorded media

D.

All recorded information, regardless of form or characteristics

Buy Now
Questions 41

Two network administrators are working together to determine a network configuration in preparation for CMMC. The administrators find that they disagree on a couple of small items. Which solution is the BEST way to ensure compliance with CMMC?

Options:

A.

Consult with the CEO of the company.

B.

Consult the CMMC Assessment Guides and NIST SP 800-171.

C.

Go with the network administrator's ideas with the least stringent controls.

D.

Go with the network administrator's ideas with the most stringent controls.

Buy Now
Questions 42

Which domains are a part of a Level 1 Self-Assessment?

Options:

A.

Access Control (AC), Risk Management < RM), and Media Protection (MP)

B.

Risk Management (RM). Access Control (AC), and Physical Protection (PE)

C.

Access Control (AC), Physical Protection (PE), and Identification and Authentication (IA)

D.

Risk Management (RM). Media Protection (MP), and Identification and Authentication (IA)

Buy Now
Questions 43

During the planning phase of the Assessment Process. C3PAO staff are reviewing the various entities associated with an OSC that has requested a CMMC Level 2 Assessment. Which term describes the people, processes, and technology external to the HQ Organization that participate in the assessment but will not receive a CMMC Level unless an enterprise Assessment is conducted?

Options:

A.

Host Unit

B.

Organization

C.

Coordinating Unit

D.

Supporting Organization/Unit

Buy Now
Questions 44

An OSC receives an email with "CUI//SP-PRVCY//FED Only" in the body of the message Which organization's website should the OSC go to identify what this marking means?

Options:

A.

NARA

B.

CMMC-AB

C.

DoD Contractors FAQ page

D.

DoD 239.7601 Definitions page

Buy Now
Questions 45

Who has the initial responsibility for identifying and managing conflicts of interest?

Options:

A.

OSC

B.

C3PAO

C.

CMMC-AB

D.

Lead Assessor

Buy Now
Questions 46

In the Code of Professional Conduct, what does the practice of Professionalism require?

Options:

A.

Do not copy materials without permission to do so.

B.

Do not make assertions about assessment outcomes.

C.

Refrain from dishonesty in all dealings regarding CMMC.

D.

Ensure the security of all information discovered or received.

Buy Now
Questions 47

After a CMMC Level 2 certification assessment, the Lead Assessor (Lead CCA) is preparing to present the Final Recommended Findings to the OSC . Which statement BEST describes the Lead Assessor’s responsibility for delivering the assessment findings to the OSC?

Options:

A.

Summary recommendations presented using the CMMC Assessment Findings Brief are sufficient.

B.

Detailed findings must be presented to the OSC along with clear evidence of how the ratings map to the assessor’s findings.

C.

The initial report delivered to the OSC will only include an overall assessment MET or NOT MET score along with a score for each practice.

D.

The Lead Assessor is required to submit their initial assessment findings to the C3PAO for review before they can be shared with the OSC.

Buy Now
Questions 48

Which term describes assessing the ability of a unit equipped with a system to support its mission while withstanding cyber threat activity representative of an actual adversary?

Options:

A.

Penetration test

B.

Black hat testing

C.

Red cell assessment

D.

Adversarial assessment

Buy Now
Questions 49

While conducting a CMMC Assessment, a Lead Assessor is given documentation attesting to Level 1 identification and authentication practices by the OSC. The Lead Assessor asks the CCP to review the documentation to determine if identification and authentication controls are met. Which documentation BEST satisfies the requirements of IA.L1-3.5.1: Identify system users. processes acting on behalf of users, and devices?

Options:

A.

Procedures for implementing access control lists

B.

List of unauthorized users that identifies their identities and roles

C.

User names associated with system accounts assigned to those individuals

D.

Physical access policy that states. "All non-employees must wear a special visitor pass or be escorted."

Buy Now
Questions 50

Which are guiding principles in the CMMC Code of Professional Conduct?

Options:

A.

Objectivity, information integrity, and higher accountability

B.

Objectivity, information integrity, and proper use of methods

C.

Proper use of methods, higher accountability, and objectivity

D.

Proper use of methods, higher accountability, and information integrity

Buy Now
Questions 51

Per DoDI 5200.48: Controlled Unclassified Information (CUI), CUI is marked by whom?

Options:

A.

DOD OUSD

B.

Authorized holder

C.

Information Disclosure Official

D.

Presidentially authorized Original Classification Authority

Buy Now
Questions 52

Regarding the Risk Assessment (RA) domain, what should an OSC periodically assess?

Options:

A.

Organizational operations, business assets, and employees

B.

Organizational operations, business processes, and employees

C.

Organizational operations, organizational assets, and individuals

D.

Organizational operations, organizational processes, and individuals

Buy Now
Questions 53

There are 15 practices that are NOT MET for an OSC's Level 2 Assessment. All practices are applicable to the OSC. Which determination should be reached?

Options:

A.

The OSC may have 90 days for remediating NOT MET practices.

B.

The OSC is not eligible for an option to remediate NOT MET practices.

C.

The OSC may be eligible for an option to remediate NOT MET practices.

D.

The OSC is not eligible for an option to remediate after the assessment is canceled.

Buy Now
Questions 54

In CMMC High-Level scoping, which definition BEST describes an HQ organization?

Options:

A.

The entity that carries out the tasks under a contract

B.

The unit to which a CMMC Level is applied for each contract

C.

The teams, services, and technologies that provide support to a Host Unit

D.

The entity legally responsible for the delivery of products or services under a contract

Buy Now
Questions 55

While conducting a CMMC Level 2 Assessment, a CCP is reviewing an OSC's personnel security process. They have a policy that describes screening individuals prior to authorizing access to CUI, but it does not mention what organizations should be looking for in an individual. There is no link to a process or procedural document. What should the OSC evaluate when screening individuals prior to accessing CUI?

Options:

A.

They are trusted and well liked

B.

They are a hard and loyal worker

C.

Their conduct, integrity, and loyalty

D.

Their functionality, reliability, and ability to adapt

Buy Now
Questions 56

Companies that knowingly defraud the government by not being in compliance with cybersecurity regulations are at risk of being held liable for:

Options:

A.

The contract value plus a penalty as stated in the Cyber Claims Act

B.

The contract value plus a penalty as stated in the False Claims Act

C.

Three times the contract value plus a penalty as stated in the Cyber Claims Act

D.

Three times the contract value plus a penalty as stated in the False Claims Act

Buy Now
Questions 57

Which training is a CCI authorized to deliver through an approved CMMC LTP?

Options:

A.

CMMC-AB approved training

B.

DoD DFARS and CMMC-AB approved training

C.

NARA CUI training and CMMC-AB approved training

D.

DoD DFARS, NARA CUI, and CMMC-AB approved training

Buy Now
Questions 58

A dedicated local printer is used to print out documents with FCI in an organization. This is considered an FCI Asset Which function BEST describes what the printer does with the FCI?

Options:

A.

Encrypt

B.

Manage

C.

Process

D.

Distribute

Buy Now
Questions 59

A Lead Assessor and an OSC's Assessment Official have agreed to have the Assessment results presented during the final Daily Checkpoint of the OSC's CMMC Level 2 Assessment. Which document MUST the Lead Assessor use to present assessment findings to the OSC?

Options:

A.

CMMC POA & M Brief

B.

CMMC Findings Brief

C.

CMMC Assessment Tracker Tool

D.

CMMC Recommended Findings template

Buy Now
Questions 60

What is a PRIMARY activity that is performed while conducting an assessment?

Options:

A.

Develop assessment plan.

B.

Collect and examine evidence.

C.

Verify readiness to conduct assessment.

D.

Deliver recommended assessment results.

Buy Now
Questions 61

Where does the requirement to include a required practice of ensuring that personnel are trained to carry out their assigned information security-related duties and responsibilities FIRST appear?

Options:

A.

Level 1

B.

Level 2

C.

Level 3

D.

All levels

Buy Now
Questions 62

A company has a government services division and a commercial services division. The government services division interacts exclusively with federal clients and regularly receives FCI. The commercial services division interacts exclusively with non-federal clients and processes only publicly available information. For this company's CMMC Level 1 Self-Assessment, how should the assets supporting the commercial services division be categorized?

Options:

A.

FCI Assets

B.

Specialized Assets

C.

Out-of-Scope Assets

D.

Operational Technology Assets

Buy Now
Questions 63

Which term describes "the protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to. or modification of information"?

Options:

A.

Adopted security

B.

Adaptive security

C.

Adequate security

D.

Advanced security

Buy Now
Questions 64

Recording evidence as adequate is defined as the criteria needed to:

Options:

A.

verify, based on an assessment and organizational scope.

B.

verify, based on an assessment and organizational practice.

C.

determine if a given artifact, interview response, demonstration, or test meets the CMMC scope.

D.

determine if a given artifact, interview response, demonstration, or test meets the CMMC practice.

Buy Now
Questions 65

In scoping a CMMC Level 1 Self-Assessment, it is determined that an ESP employee has access to FCI. What is the ESP employee considered?

Options:

A.

In scope

B.

Out of scope

C.

OSC point of contact

D.

Assessment Team Member

Buy Now
Questions 66

Which words summarize categories of data disposal described in the NIST SP 800-88 Revision 1. Guidelines for Media Sanitation?

Options:

A.

Clear, purge, destroy

B.

Clear redact, destroy

C.

Clear, overwrite, purge

D.

Clear, overwrite, destroy

Buy Now
Exam Code: CMMC-CCP
Exam Name: Certified CMMC Professional (CCP) Exam
Last Update: Apr 6, 2026
Questions: 221
CMMC-CCP pdf

CMMC-CCP PDF

$25.5  $84.99
CMMC-CCP Engine

CMMC-CCP Testing Engine

$30  $99.99
CMMC-CCP PDF + Engine

CMMC-CCP PDF + Testing Engine

$40.5  $134.99