Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CMMC-CCA Exam Dumps - Cyber AB CMMC Questions and Answers

Question # 34

An OSC has built an enclave for its production environment. The enclave sits behind a firewall, with all equipment connected through a switch. There is a shipping workstation and physically connected label printer (used for the sales system, which does not process CUI) that the OSC claims are Contractor Risk Managed Assets (CRMA). Other than showing that the shipping workstation and label printer are not intended to store or transmit CUI, and documenting them in the SSP,

how BEST would the OSC show that the shipping workstation and label printer are Contractor Risk Managed Assets?

Options:

A.

Document in the asset inventory and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

B.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using vendor-recommended risk-based security practices; and include them in the network diagram.

C.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using the organization’s risk-based security policies and procedures; and include them in the network diagram.

D.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using industry risk-based security best practices; and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

Buy Now
Question # 35

A Lead Assessor is conducting an assessment for an OSC. The Lead Assessor is collecting evidence regarding the OSC’s network separation techniques. Which technique would be considered a logical separation technique and would fall within the scope of the assessment?

Options:

A.

Data loss alerting configured at the edge of the network containing CUI assets

B.

Access limitation based on badge access assigned to employees based on role

C.

Role-based access control within a properly implemented identity and access management tool

D.

A proxy-configured firewall that prevents data from flowing along the physical connection path

Buy Now
Question # 36

The assessment team is discussing the pre-assessment scope with an OSC. The OSC would like to limit the scope of the security requirements in environments that contain FCI and/or CUI. In this case, the OSC should:

Options:

A.

Request a single CMMC certification for both activities

B.

Choose to conduct two separate CMMC certification activities

C.

Define an Assessment Scope for those assets that process, store, or transmit FCI

D.

Define a CMMC Self-Assessment Scope for only those assets that process, store, or transmit CUI

Buy Now
Question # 37

An OSC is preparing for an assessment and wants to gather evidence that will be used by the Lead Assessor to determine the scope of the assessment. The OSC currently operates a hybrid network, with part of their infrastructure at their physical location and part of their infrastructure in a cloud environment.

What evidence should the OSC collect that would assist the Lead Assessor in determining cloud and hybrid environment constraints?

Options:

A.

Subnetworks list

B.

System inventory

C.

Company-owned hardware list

D.

Cloud Service Provider’s Customer Responsibility Matrix

Buy Now
Question # 38

An Assessor is evaluating whether an OSC has implemented adequate controls to meet AC.L2-3.1.7: Privileged Functions. The OSC has procedures that define privileged vs. non-privileged account provisioning and an access control policy that restricts execution of certain functions only to privileged users.

What might the Assessor do to further evaluate the implementation of this practice?

Options:

A.

Examine system logs to verify automatic updates are being applied.

B.

Test whether the application of a patch is captured in system logging.

C.

Test whether a non-privileged user can log into a system where CUI is stored.

D.

Examine a user access list for users that are authorized to access a key management system.

Buy Now
Question # 39

The Lead Assessor is conducting an assessment for an OSC. The Lead Assessor has finished collecting and examining evidence from the assessment.

Based on this information, what is the NEXT logical step?

Options:

A.

Develop an assessment plan.

B.

Deliver recommended assessment results.

C.

Generate final recommended assessment results.

D.

Determine and record initial practice scores.

Buy Now
Question # 40

A manufacturing company is seeking Level 2 certification. The loading docks are currently accessible directly from the company’s main parking lot, which may lead to unauthorized access to facilities. Based on this information, how should this method be modified to BEST meet Level 2 requirements?

Options:

A.

Implement physical perimeter controls, such as turnstiles, to limit access.

B.

Require visitors to check in at the reception desk and maintain a visitor log.

C.

Implement physical perimeter controls, such as cameras, to limit access to only authorized personnel.

D.

Implement physical perimeter controls, such as a gate with a badge system, to limit access to only authorized personnel.

Buy Now
Question # 41

AC.L2-3.1.6: Non-Privileged Account Use is being assessed. Which procedure BEST meets all of the standards for non-privileged account use?

Options:

A.

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for security tasks.

B.

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their non-privileged account for security tasks.

C.

All non-IT employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for all tasks.

D.

All non-IT employees are given a non-privileged user account.

System Administrators are given only an administrator account.

System Administrators use their administrator account for all tasks.

Buy Now
Question # 42

An OSC has an established password policy. The OSC wants to improve its password protection security by implementing a single change. Which of the following is an acceptable element to add to the OSC’s password policy?

Options:

A.

Require passwords to be changed every 18 months.

B.

Require passwords to be 5 to 7 characters long.

C.

Add the use of salted two-way cryptographic hashes of passwords.

D.

Add the use of salted one-way cryptographic hashes of passwords, where possible.

Buy Now
Question # 43

An OSC seeking Level 2 certification is working with an ESP. The organization is trying to determine if the ESP is considered within the assessment and is reviewing the Service Level Agreement (SLA) between the organization and the ESP. Which SLA component should be taken into consideration to determine if the ESP is within the assessment scope?

Options:

A.

Services

B.

Intervals

C.

Penalties

D.

Measurements

Buy Now
Exam Code: CMMC-CCA
Exam Name: Certified CMMC Assessor (CCA) Exam
Last Update: Sep 3, 2025
Questions: 150
CMMC-CCA pdf

CMMC-CCA PDF

$29.75  $84.99
CMMC-CCA Engine

CMMC-CCA Testing Engine

$33.25  $94.99
CMMC-CCA PDF + Engine

CMMC-CCA PDF + Testing Engine

$47.25  $134.99