Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Cyber AB CMMC-CCA Online Access

Page: 2 / 11
Total 150 questions

Certified CMMC Assessor (CCA) Exam Questions and Answers

Question 5

An in-house compliance expert for a large defense contractor is reviewing the organization’s training materials for personnel handling CUI. After a widely publicized insider threat incident, management requires that training address insider threat risks. What is a critical component of insider threat awareness training?

Options:

A.

A bounty system for identifying and stopping insider threats

B.

A company-wide ranking of individuals by insider threat risk

C.

Law enforcement case studies on known insider threat activities

D.

Processes and procedures for reporting suspected insider threat activity

Question 6

An OSC has a minimal physical footprint consisting only of network equipment, workstations, and a centralized domain environment. File storage is centralized in a third-party vendor’s FedRAMP Moderate authorized cloud environment, and employees access files using the cloud integration with their workstations. Since CUI is stored in the FedRAMP Moderate authorized environment, the OSC should prepare to have which environment(s) assessed?

Options:

A.

Cloud environment only

B.

OSC’s physical network only

C.

Cloud environment and the OSC’s physical network

D.

OSC’s physical network, the cloud environment, and the cloud vendor’s employee network

Question 7

During preparations for a CMMC Level 2 Assessment, a client submits a request to their consulting RP to learn more about Specialized Asset requirements. The client is unsure if their camera system, used for safety data collection purposes within their machining shop, should be documented within the SSP. Which reason is a satisfactory reason to exclude the camera system from the SSP, and thus the assessment scope?

Options:

A.

The video data are deleted every seven days.

B.

The Technology Control Plan does not address the camera system.

C.

The camera data are uploaded to a FedRAMP MODERATE authorized cloud storage system.

D.

The camera system network is physically and logically isolated and does not capture data related to controlled projects.

Question 8

A CCA is prohibited from doing which of the following?

Options:

A.

Verifying key internal system boundaries

B.

Determining if physically separated assets contain CUI

C.

Ensuring the external system boundary is fully defined

D.

Examining whether communications are monitored at the external system boundary

Page: 2 / 11
Total 150 questions