Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CMMC-CCA Certified CMMC Assessor (CCA) Exam Questions and Answers

Questions 4

When preparing for an assessment, the assessor determines that the client’s proprietary data resides within an enclave. However, the assessor is unable to review policies containing proprietary data onsite and plans to have the policies copied on removable media by the client’s IT staff, whom they are scheduled to interview. What should the assessor consider as part of their planning?

Options:

A.

No proprietary data can leave the client’s environment under any circumstances.

B.

The assessor can transmit data outside the client’s environment if the client’s IT support staff grants access.

C.

No proprietary data can leave the client’s environment without the express written consent of the OSC POC.

D.

No proprietary data can leave the client’s environment without the express written consent of the OSC Assessment Official.

Buy Now
Questions 5

While examining controls on the use of portable storage devices, an assessor conducts an interview with a mid-level internal system administrator. The administrator describes the process to check out portable storage devices, which includes a user emailing IT staff directly, verifying that the media classification label matches the data classification, and limiting use of the device to a specified external system.

What is a MISSING element for the assessment of AC.L2-3.1.21: Portable Storage Use?

Options:

A.

Method of destruction of portable storage devices

B.

Recorded management authorization for the use of portable storage devices

C.

An inventory of portable storage devices provided by the National Security Agency

D.

A directory of personnel background checks to be consulted prior to device checkout

Buy Now
Questions 6

While reviewing CA.L2-3.12.3: Security Control Monitoring, the CCA notices that the assessment period is defined as one year. An OSC's SSP states that under CA.L2-3.12.3, security controls are monitored using the same one-year periodicity to ensure the continued effectiveness of the controls. The assessor understands that some CMMC practices can reference other practices for the entirety of their implementation. Is the OSC’s implementation under CA.L2-3.12.3: Security Control Monitoring acceptable?

Options:

A.

No, even when referencing other practices more description is always needed.

B.

No, monitoring must be conducted on an ongoing basis to ensure continued effectiveness.

C.

Yes, a one-year period for security control monitoring is acceptable.

D.

Yes, as long as CA.L2-3.12.1 has been scored as MET, they do need to be monitored.

Buy Now
Questions 7

During an assessment, the team is interviewing the IT staff to understand the ways in which the organization protects backup data. Because the company’s backups contain CUI, the Lead Assessor asks the IT engineer which method is used to ensure that the confidentiality of the backup data is being protected. Which implementation is LEAST LIKELY to be acceptable?

Options:

A.

Alternative physical controls for site access

B.

Managing who has access to the information

C.

Physically securing devices and media that contain CUI

D.

Encrypting files or media using industry-standard encryption

Buy Now
Questions 8

An OSC has a hardware and software list used to manage company assets. Which is the BEST evidence to show the OSC is managing the system baseline?

Options:

A.

Media protection

B.

Physical protection

C.

Configuration management

D.

Identification and authentication policy

Buy Now
Questions 9

An OSC has contracted a C3PAO to perform a Level 2 Assessment. As the Lead Assessor is analyzing the assessment requirements, it is found that the OSC does not have a document detailing the assessment scope. How can this problem BEST be fixed?

Options:

A.

The Assessment Team is supposed to generate the document before moving forward.

B.

The CCA tells the OSC they must provide the document before the assessment can begin.

C.

The OSC and the Lead Assessor jointly create the document at the beginning of the assessment.

D.

The Lead Assessor can regulate the assessment and create/adjust the document moving forward.

Buy Now
Questions 10

While conducting a CMMC Level 2 Assessment for a small waveguide manufacturer, the client provides a copy of their CMMC Level 1 Self-Assessment that their senior official has recently approved and uploaded to the Supplier Performance Risk System (SPRS). What type of information may be covered within the Level 1 Self-Assessment that is OUTSIDE the scope of a Level 2 assessment?

Options:

A.

CUI in paper format

B.

FCI within the CUI production enclave

C.

FCI data within the description in the contractor self-assessment

D.

Sensitive Compartmented Information (SCI) shredded by an approved vendor

Buy Now
Questions 11

While conducting a CMMC Level 2 gap analysis with a large defense contractor, a CMMC RP confirms that the organization uses a RADIUS server for authentication. What additional method could be used to comply with AC.L2-3.1.17: Wireless Access Protection?

Options:

A.

Layer 3 switch

B.

Intrusion detection solution

C.

WPA2-Enterprise encryption

D.

Frequency-hopping wireless access

Buy Now
Questions 12

In order to perform an interview, the Lead Assessor MUST ensure interview questions are:

Options:

A.

Yes/no questions

B.

Asked by any member of the OSC’s team

C.

Asked to those who implement, perform, or support the practices

D.

Asked with multiple people simultaneously to limit the number of interviews needed

Buy Now
Questions 13

During a company’s assessment, the CCA notices that the server room door is kept open with a fan in the entryway because the cooling system is inadequate and the machines are overheating. According to the physical protection policy, the server room’s keypad is the mechanism for managing and controlling access to this equipment, and only the IT team should have access to the server room. However, with the door open, the keypad is not necessary, and anyone can enter the room.

The CCA asks the IT manager how access to this room is protected while the door is open. Which response would allow the company to still meet the physical security requirement?

Options:

A.

“Only employees are allowed in this area.”

B.

“We trust our employees not to enter the room if they are not supposed to.”

C.

“The server is located inside another room that only the IT team has access to.”

D.

“The CEO emailed all employees that the server room door would be kept open but only the IT team should enter.”

Buy Now
Questions 14

Some OSCs share real estate with other companies. To protect FCI/CUI behind unmanned entrances to buildings, floors, or other areas where FCI/CUI is created, used, stored, or transmitted, which of the following is the BEST method?

Options:

A.

Turnstiles to limit access

B.

Cameras to monitor and record foot traffic

C.

Bold signage with strong language to discourage entry

D.

One-way gates which require proper credentials or intercom authorization to unlock and permit entry

Buy Now
Questions 15

In validating the OSC’s implementation of AC.L2-3.1.16: Wireless Access Authorization, the CCA observes various personal and non-enterprise devices connected to the OSC’s Wi-Fi. Because organizations handle wireless access differently, the CCA must locate evidence showing who has ultimate authority over wireless access. Which authority is acceptable for authorizing wireless access?

Options:

A.

The CEO mandating IT to add their personal phone to the company Wi-Fi

B.

A written policy executed by the CEO listing the pre-authorization requirements for Wi-Fi connectivity

C.

The CEO emailing the company instructing everyone to put personal devices on the company Wi-Fi

D.

A detailed document from the head of IT with instructions on how to connect to the guest Wi-Fi network

Buy Now
Questions 16

A company has a CUI enclave for handling all CUI processed, stored, and transmitted through the organization. While interviewing the IT manager, the CCA asks how assets that can, but are not intended to, handle CUI are identified. The IT manager refers to the CUI system’s network diagram (which includes these assets) as well as the asset inventory (which lists these assets as Contractor Risk Managed Assets). Which other artifact MUST also mention these assets?

Options:

A.

The identification and authentication policy should show how these assets are identified.

B.

The physical protection policy should list these assets as being part of the physical environment of the organization.

C.

The awareness and training program should include these assets so they are covered for all employees.

D.

The SSP should show these assets are managed using the company’s risk-based security policies, procedures, and practices.

Buy Now
Questions 17

While conducting a CMMC Level 2 Third-Party Assessment of a small defense contractor, an assessor discovers that the contractor’s Information Security Policy has no documented change records demonstrating executive approval. The IT director states that they will add change records in the future, but that other evidence exists. Which documentation is MOST able to demonstrate persistent and habitual adherence to CMMC requirements?

Options:

A.

Handwritten notes from executive committee meetings discussing implementation

B.

Several years’ worth of saved emails from the executive team approving policies and directing adherence

C.

A notarized letter from the previous CEO stating that they approved information security policies annually

D.

Transcribed interviews with new employees discussing their understanding of information security policies

Buy Now
Questions 18

A C3PAO is conducting a Level 2 assessment of a midsized construction contractor that does both private (commercial) and federal work. The contractor’s documentation states that all CUI flows through a single building on their office campus and is logically, physically, and administratively isolated from the rest of the environment. Why might an assessor request access to assess controls within a building or area not listed as in-scope in the documentation?

Options:

A.

If the assessor sees personnel carrying locked cases into the other building or area

B.

If the OSC has an underground passageway connecting the CUI building to a non-CUI building

C.

If network diagrams indicate the commercial and federal sectors share a single Internet connection

D.

If Human Resources that supports both commercial and federal sectors sits in the other building or area

Buy Now
Questions 19

Both the SSP and network diagrams presented to the Lead Assessor by the OSC indicate managed service providers (MSPs) within the assessment boundary. In order to BEST understand the impact of the MSPs, what should the Lead Assessor do?

Options:

A.

Ascertain what employees the MSP has onsite

B.

Request the customer responsibility matrix related to the MSPs

C.

Review the inventory to see how the assets have been classified

D.

Inspect the other initial documents presented including policies and organization charts

Buy Now
Questions 20

A CCA is prohibited from doing which of the following?

Options:

A.

Verifying key internal system boundaries

B.

Determining if physically separated assets contain CUI

C.

Ensuring the external system boundary is fully defined

D.

Examining whether communications are monitored at the external system boundary

Buy Now
Questions 21

An assessor is assigned by the Lead Assessor to the pre-assessment template regarding evidence. There are several entries that include how the Assessment Team will identify, obtain, and inventory evidence. What else is required to determine readiness to conduct the assessment?

Options:

A.

Identify the scope of the OSC.

B.

Delineate what is required to verify the evidence.

C.

Delineate observations by the Assessment Team.

D.

Identify additional people to interview to gather more evidence.

Buy Now
Questions 22

While conducting a Level 2 Assessment, the Assessment Team begins reviewing assessment objects. The team identifies concerns with several of the objects presented. Which artifacts would require the MOST verification?

Options:

A.

Current artifacts produced by individuals performing the work

B.

Artifacts created 18 months ago by individuals performing the work

C.

Current artifacts produced by individuals that work for a separate entity of the company

D.

Artifacts created 18 months ago by individuals that work for a separate entity of the company

Buy Now
Questions 23

An OSC has an established password policy. The OSC wants to improve its password protection security by implementing a single change. Which of the following is an acceptable element to add to the OSC’s password policy?

Options:

A.

Require passwords to be changed every 18 months.

B.

Require passwords to be 5 to 7 characters long.

C.

Add the use of salted two-way cryptographic hashes of passwords.

D.

Add the use of salted one-way cryptographic hashes of passwords, where possible.

Buy Now
Questions 24

An OSC seeking Level 2 certification is working with an ESP. The organization is trying to determine if the ESP is considered within the assessment and is reviewing the Service Level Agreement (SLA) between the organization and the ESP. Which SLA component should be taken into consideration to determine if the ESP is within the assessment scope?

Options:

A.

Services

B.

Intervals

C.

Penalties

D.

Measurements

Buy Now
Questions 25

While assessing a company, the CCA is determining whether the company controls and manages connections between its corporate network and all external networks. The company has: (1) a strict employee policy prohibiting personal Internet use and personal email on company computers, and (2) firewalls plus a connection allow-list so only authorized external networks can connect to the company network. Are these safeguards sufficient to meet the applicable CMMC requirement?

Options:

A.

Yes. The company’s strict employee policy is the best practice for meeting the requirement.

B.

No. The company must isolate its system from all external connections to meet the requirement.

C.

Yes. The company’s firewalls and connection allow-lists are appropriate technical controls to meet the requirement.

D.

No. The company needs full control over all external systems it interfaces with to meet the requirement.

Buy Now
Questions 26

The client has a Supervisory Control and Data Acquisition (SCADA) system as OT to be evaluated as part of its assessment. In reviewing network architecture and conducting interviews, the assessor determines that a firewall separates the SCADA system from the client’s enterprise network and that CUI is not processed by the SCADA system. Based on this information, what is an appropriate outcome?

Options:

A.

The assessor includes the OT within the assessment

B.

The assessor determines the SCADA system is out-of-scope for the assessment

C.

The assessor includes all systems identified by the client as part of the assessment

D.

The assessor determines that all Specialized Assets are within the scope of the assessment

Buy Now
Questions 27

An OSC is undergoing CMMC Assessment on an enterprise-wide basis. While walking to the conference room, the Assessor notices a printer repair technician in the hallway, unescorted, repairing a printer marked “Authorized for CUI printing.” What is the NEXT step the Lead Assessor should take regarding PE.L2-3.10.3: Escort Visitors?

Options:

A.

Make a note and score the practice as MET

B.

Ask the printer technician to leave immediately

C.

Make a note and score the practice as NOT MET

D.

Ask the OSC if the printer technician has authorized access

Buy Now
Questions 28

The OSC’s network consists of a single network switch that connects all devices. This includes the OSC’s OT equipment, which processes CUI. The OT controller requires an unsupported operating system.

What can the Lead Assessor BEST conclude about the overall compliance with MA.L2-3.7.1: Perform Maintenance?

Options:

A.

It is MET only if every asset that is not a Specialized Asset is maintained.

B.

It is MET only if the environments are demarcated on the baseline diagram.

C.

It is NOT MET because industrial equipment should not be processing CUI.

D.

It is NOT MET because the OSC has not managed the risk of a CUI system being outdated.

Buy Now
Questions 29

FIPS-validated cryptography is required to meet CMMC practices that protect CUI when transmitted or stored outside the OSC’s CMMC enclave. What source does the CCA use to verify that the cryptography the OSC has implemented is FIPS-validated?

Options:

A.

Cryptographic section of the OSC’s SSP

B.

Vendor cryptographic module documentation

C.

NIST Module Validation Program

D.

Cryptographic section of the Shared Responsibility Matrix

Buy Now
Questions 30

A manufacturing company is seeking Level 2 certification. The loading docks are currently accessible directly from the company’s main parking lot, which may lead to unauthorized access to facilities. Based on this information, how should this method be modified to BEST meet Level 2 requirements?

Options:

A.

Implement physical perimeter controls, such as turnstiles, to limit access.

B.

Require visitors to check in at the reception desk and maintain a visitor log.

C.

Implement physical perimeter controls, such as cameras, to limit access to only authorized personnel.

D.

Implement physical perimeter controls, such as a gate with a badge system, to limit access to only authorized personnel.

Buy Now
Questions 31

While scoping the assessment, the assessor learns that the OSC uses various cloud-based solutions sporadically as part of its normal course of business. The OSC states that most business is conducted on-premises and that only a small amount of business uses the cloud. The OSC thinks the cloud is only used for system backups, but there are isolated exceptions.

Are the data provided sufficient to determine that the OSC limits connection to external information systems?

Options:

A.

No, the OSC stated most of its business is on-premises.

B.

No, the OSC did not fully define the extent external connections are used.

C.

Yes, the OSC confirmed that external connections occur.

D.

Yes, the OSC confirmed that external connections occur for system backups.

Buy Now
Questions 32

A company has a firewall to regulate how data flows into and out of its network. Based on an interview with their IT staff, all connections to their systems are logged, and suspicious traffic generates alerts. Examination of which artifact should give the CCA the details on how these are implemented?

Options:

A.

Physical access logs

B.

Boundary protection procedures

C.

Account management document

D.

Configuration management policy

Buy Now
Questions 33

An OSC outsources all of its security incident and event monitoring work to a third-party SOC. Additionally, the OSC utilizes a cloud-hosted antivirus (AV) system to fulfill the requirement of having virus protection without hosting additional servers on-site.

During the scoping discussion, both the SOC and AV should be listed as what type of asset?

Options:

A.

They are CUI Assets due to their operation within a CUI network.

B.

They are Out-of-Scope Assets due to being fully hosted/operated by third parties.

C.

They are Security Protection Assets due to their performance of security functions.

D.

They are Contractor Risk Managed Assets because they are not physically or logically isolated from CUI assets.

Buy Now
Questions 34

ESPs are exceptionally common today, given that many organizations are turning to secure cloud offerings to establish and maintain compliance. Integral to these relationships is a responsibility matrix, which defines who is responsible for specific items such as security. This can be a very complex assortment of taskings associated with federal compliance, but what is the MOST important thing to remember?

Options:

A.

The ESP is technically not part of the DIB and has no responsibility to be CMMC compliant in its own right.

B.

The CMMC Assessment Team will factor in any documentation provided by the ESP when evaluating the OSC for compliance.

C.

The relationship of an OSC with an ESP is a partnership and the CMMC Assessment will evaluate the ESP at the same time as the OSC.

D.

Only the OSC is being assessed for compliance, and while the ESP may have a lot of responsibilities in the matrix, the OSC is ultimately responsible for meeting the requirements as specified by government mandates.

Buy Now
Questions 35

What should the Lead Assessor do to BEST ensure the evidence supplied effectively meets the intent of the standard for a practice?

Options:

A.

Ensure the evidence for each objective under a practice is adequate.

B.

Ensure the evidence is sufficient to meet the requirements for a practice.

C.

Ensure the evidence is complete, validated, and can be mapped to the practice requirements.

D.

Ensure the evidence covers all the scope and the identified organizations and corresponds to the practice and objectives.

Buy Now
Questions 36

An Assessor is evaluating whether an OSC has implemented adequate controls to meet AC.L2-3.1.7: Privileged Functions. The OSC has procedures that define privileged vs. non-privileged account provisioning and an access control policy that restricts execution of certain functions only to privileged users.

What might the Assessor do to further evaluate the implementation of this practice?

Options:

A.

Examine system logs to verify automatic updates are being applied.

B.

Test whether the application of a patch is captured in system logging.

C.

Test whether a non-privileged user can log into a system where CUI is stored.

D.

Examine a user access list for users that are authorized to access a key management system.

Buy Now
Questions 37

A Lead Assessor is preparing to conduct a Level 2 Assessment for an OSC. The assessor already determined the assessment scope and systems included. In addition, the assessor requests:

    Results of the most recent OSC self-assessment or any pre-assessments by an RPO,

    The System Security Plan (SSP), and

    A list of all OSC staff who play a role in in-scope procedures.

Based on this information, which item would the assessor MOST LIKELY request when preparing to conduct a Level 2 Assessment?

Options:

A.

A list of objectives

B.

A manual for each system

C.

A preliminary list of the anticipated evidence

D.

A list of assets that are determined to be out-of-scope

Buy Now
Questions 38

The assessor begins the assessment by meeting with the client’s stakeholders and learns that multiple subsidiaries exist. In order to perform a complete assessment, the assessor must review documents from multiple entities as multiple, corresponding Commercial and Government Entity (CAGE) codes were provided. Which of the following entities may receive certification as a result of this?

Options:

A.

HQ organization

B.

HQ organization and Host unit

C.

Host unit and Supporting Organizations/Units

D.

HQ organization, Host unit, and Supporting Organizations/Units

Buy Now
Questions 39

A CCA is assessing the concept of least functionality in accordance with CM.L2-3.4.6: Least Functionality.

Which method is the LEAST LIKELY to be useful as an assessment technique?

Options:

A.

Interview personnel with information security responsibilities.

B.

Interview personnel with application development responsibilities.

C.

Interview personnel who wrote the configuration management policy.

D.

Interview personnel with security configuration management responsibilities.

Buy Now
Questions 40

In an effort to understand whether the OSC appropriately defined the scope to exclude items that should not be assessed, which description does NOT belong in the scope?

Options:

A.

Data center in another state used by the OSC

B.

A smoke detector that is connected to the OSC network

C.

The SIEM tool used by the managed service provider in managing the OSC

D.

The office where its managed service provider’s management office is located

Buy Now
Questions 41

While conducting a CMMC Level 2 assessment at a 100-person manufacturing company, the assessor receives a yellow badge labeled “SPECIAL ACCESS.” The assessor observes multiple badge types used by staff and visitors. The client explains that only three badge colors correspond to controlled access (with electronic access), while the rest are identifiers for seniority. How can the assessor BEST verify that the three colors are the only badges capable of accessing controlled areas for CUI-related activities?

Options:

A.

Interviewing CUI-cleared staff

B.

Reviewing standard operating procedures for badge issuance

C.

Reviewing retained electronic badge entry logs or audits thereof

D.

Borrowing a badge from another staff member and attempting to enter a controlled space

Buy Now
Questions 42

An OSC is preparing for an assessment and wants to gather evidence that will be used by the Lead Assessor to determine the scope of the assessment. The OSC currently operates a hybrid network, with part of their infrastructure at their physical location and part of their infrastructure in a cloud environment.

What evidence should the OSC collect that would assist the Lead Assessor in determining cloud and hybrid environment constraints?

Options:

A.

Subnetworks list

B.

System inventory

C.

Company-owned hardware list

D.

Cloud Service Provider’s Customer Responsibility Matrix

Buy Now
Questions 43

A company is undergoing a CMMC Level 2 Assessment. The Assessment Team is planning and preparing the assessment. Who is responsible for identifying methods, techniques, and responsibilities for collecting, managing, and reviewing evidence?

Options:

A.

Lead Assessor

B.

Assessment Team Member

C.

C3PAO Quality Oversight Manager

D.

CMMC Quality Assurance Professional

Buy Now
Questions 44

A Lead Assessor is conducting an assessment for an OSC. The Lead Assessor is collecting evidence regarding the OSC’s network separation techniques. Which technique would be considered a logical separation technique and would fall within the scope of the assessment?

Options:

A.

Data loss alerting configured at the edge of the network containing CUI assets

B.

Access limitation based on badge access assigned to employees based on role

C.

Role-based access control within a properly implemented identity and access management tool

D.

A proxy-configured firewall that prevents data from flowing along the physical connection path

Buy Now
Questions 45

During an assessment, the Assessment Team has identified, according to the SSP and network diagram, that there is a mission system that cannot be altered but that has privileged accounts which should have MFA applied. As it is not possible to deploy a typical type of MFA on the mission system, which of the following constitutes a sufficient second factor?

Options:

A.

VPN access to the mission system

B.

User access logs on the mission system

C.

Badge access to the mission system room

D.

Remote access logs on the mission system

Buy Now

CMMC |

Exam Code: CMMC-CCA
Exam Name: Certified CMMC Assessor (CCA) Exam
Last Update: Aug 31, 2025
Questions: 150
CMMC-CCA pdf

CMMC-CCA PDF

$25.5  $84.99
CMMC-CCA Engine

CMMC-CCA Testing Engine

$30  $99.99
CMMC-CCA PDF + Engine

CMMC-CCA PDF + Testing Engine

$40.5  $134.99