Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Complete CMMC-CCA Cyber AB Materials

Page: 3 / 11
Total 150 questions

Certified CMMC Assessor (CCA) Exam Questions and Answers

Question 9

A company has five individual buildings in one business complex. During the assessment, the Assessment Team sees people entering and exiting the buildings and notices that none of the buildings have keypads or locks. The Assessment Team needs to determine how physical access is managed and controlled.

Which artifact BEST describes how access to these buildings is managed?

Options:

A.

System Security Plan (SSP)

B.

Personnel Access List

C.

Identification and Authorization Plan

D.

Physical and Environmental Protection Policy

Question 10

ESPs are exceptionally common today, given that many organizations are turning to secure cloud offerings to establish and maintain compliance. Integral to these relationships is a responsibility matrix, which defines who is responsible for specific items such as security. This can be a very complex assortment of taskings associated with federal compliance, but what is the MOST important thing to remember?

Options:

A.

The ESP is technically not part of the DIB and has no responsibility to be CMMC compliant in its own right.

B.

The CMMC Assessment Team will factor in any documentation provided by the ESP when evaluating the OSC for compliance.

C.

The relationship of an OSC with an ESP is a partnership and the CMMC Assessment will evaluate the ESP at the same time as the OSC.

D.

Only the OSC is being assessed for compliance, and while the ESP may have a lot of responsibilities in the matrix, the OSC is ultimately responsible for meeting the requirements as specified by government mandates.

Question 11

An OSC has a large multi-building facility. One building is used as the OSC’s data center. A guard is stationed at the entrance to the data center. A vendor engineer comes onsite to perform maintenance on the storage array in the data center. The guard knows the engineer well and has the engineer fill out the visitor log with the contact person’s name and phone number, the reason for the visit, and the date and time. Since the guard has known the engineer for many years, what is the BEST step the guard should take?

Options:

A.

Call the contact person and let her know that the engineer is onsite and give the engineer a temporary badge to enter the data center.

B.

Call the operations center to give the engineer temporary access to enter the data center and escort the engineer to the array and leave.

C.

Call the contact person to have her come down and escort the engineer to the array and stay with the engineer until the maintenance is complete.

D.

Call the operations center to have one of the admins escort the engineer to the array and stay with the engineer until the maintenance is complete.

Question 12

An OSC has built an enclave for its production environment. The enclave sits behind a firewall, with all equipment connected through a switch. There is a shipping workstation and physically connected label printer (used for the sales system, which does not process CUI) that the OSC claims are Contractor Risk Managed Assets (CRMA). Other than showing that the shipping workstation and label printer are not intended to store or transmit CUI, and documenting them in the SSP,

how BEST would the OSC show that the shipping workstation and label printer are Contractor Risk Managed Assets?

Options:

A.

Document in the asset inventory and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

B.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using vendor-recommended risk-based security practices; and include them in the network diagram.

C.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using the organization’s risk-based security policies and procedures; and include them in the network diagram.

D.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using industry risk-based security best practices; and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

Page: 3 / 11
Total 150 questions