Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cyber AB CMMC-CCA Practice Exam with Questions & Answers | Set: 2

Questions 11

An OSC is a wholly owned subsidiary of a large conglomerate (parent organization). The OSC and the parent organization use ID badges (PKI cards) that contain a PKI certificate and a radio frequency identification (RFID) tag used for building and system access (including systems that process, transmit, or store CUI). The parent organization does not make any decisions on how the OSC runs its security program or other matters of significance. The large conglomerate operates a machine that is used to activate the badges for both itself and the OSC. This machine is isolated in a locked room and has no network connectivity to the OSC.

The badge activation system is:

Options:
A.

In-scope because the parent organization acts as an External Service Provider to the OSC by providing PKI cards.

B.

In-scope because the OSC is part of the large conglomerate and thus any CMMC requirements of the OSC are imputed onto the large conglomerate.

C.

Out-of-scope because the OSC is the one that assigns the appropriate access to a particular PKI card.

D.

Out-of-scope because the badge activation machine is physically and logically isolated from the OSC and it is under the control of the parent organization.

Cyber AB CMMC-CCA Premium Access
Questions 12

A cloud-native OSC uses a vendor’s FedRAMP MODERATE authorized cloud environment for all aspects of their CUI needs (identity, email, file storage, office suite, etc.) as well as the vendor’s locally installable applications. The OSC properly configured the vendor’s cloud-based SIEM system to monitor all aspects of the cloud environment. The OSC’s SSP documents SI.L2-3.14.7: Identify Unauthorized Use, defining authorized use and referencing procedures for identifying unauthorized use.

How should the Certified Assessor score this practice?

Options:
A.

NOT MET because logs from physical infrastructure are not captured by the SIEM.

B.

NOT MET because locally installable applications from a cloud-native environment are not allowed.

C.

MET because being cloud-native is a great way to contain risk to a vendor’s environment.

D.

MET because the cloud SIEM is configured to monitor all of the vendor’s cloud environment.

Questions 13

In order to perform an interview, the Lead Assessor MUST ensure interview questions are:

Options:
A.

Yes/no questions

B.

Asked by any member of the OSC’s team

C.

Asked to those who implement, perform, or support the practices

D.

Asked with multiple people simultaneously to limit the number of interviews needed

Questions 14

While reviewing CA.L2-3.12.3: Security Control Monitoring, the CCA notices that the assessment period is defined as one year. An OSC's SSP states that under CA.L2-3.12.3, security controls are monitored using the same one-year periodicity to ensure the continued effectiveness of the controls. The assessor understands that some CMMC practices can reference other practices for the entirety of their implementation. Is the OSC’s implementation under CA.L2-3.12.3: Security Control Monitoring acceptable?

Options:
A.

No, even when referencing other practices more description is always needed.

B.

No, monitoring must be conducted on an ongoing basis to ensure continued effectiveness.

C.

Yes, a one-year period for security control monitoring is acceptable.

D.

Yes, as long as CA.L2-3.12.1 has been scored as MET, they do need to be monitored.

Questions 15

An OSC has contracted a C3PAO to perform a Level 2 Assessment. As the Lead Assessor is analyzing the assessment requirements, it is found that the OSC does not have a document detailing the assessment scope. How can this problem BEST be fixed?

Options:
A.

The Assessment Team is supposed to generate the document before moving forward.

B.

The CCA tells the OSC they must provide the document before the assessment can begin.

C.

The OSC and the Lead Assessor jointly create the document at the beginning of the assessment.

D.

The Lead Assessor can regulate the assessment and create/adjust the document moving forward.

Questions 16

What should the Lead Assessor do to BEST ensure the evidence supplied effectively meets the intent of the standard for a practice?

Options:
A.

Ensure the evidence for each objective under a practice is adequate.

B.

Ensure the evidence is sufficient to meet the requirements for a practice.

C.

Ensure the evidence is complete, validated, and can be mapped to the practice requirements.

D.

Ensure the evidence covers all the scope and the identified organizations and corresponds to the practice and objectives.

Questions 17

A CCA is prohibited from doing which of the following?

Options:
A.

Verifying key internal system boundaries

B.

Determining if physically separated assets contain CUI

C.

Ensuring the external system boundary is fully defined

D.

Examining whether communications are monitored at the external system boundary

Questions 18

When preparing for an assessment, the assessor determines that the client’s proprietary data resides within an enclave. However, the assessor is unable to review policies containing proprietary data onsite and plans to have the policies copied on removable media by the client’s IT staff, whom they are scheduled to interview. What should the assessor consider as part of their planning?

Options:
A.

No proprietary data can leave the client’s environment under any circumstances.

B.

The assessor can transmit data outside the client’s environment if the client’s IT support staff grants access.

C.

No proprietary data can leave the client’s environment without the express written consent of the OSC POC.

D.

No proprietary data can leave the client’s environment without the express written consent of the OSC Assessment Official.

Questions 19

A Lead Assessor is preparing to conduct a Level 2 Assessment for an OSC. The assessor already determined the assessment scope and systems included. In addition, the assessor requests:

    Results of the most recent OSC self-assessment or any pre-assessments by an RPO,

    The System Security Plan (SSP), and

    A list of all OSC staff who play a role in in-scope procedures.

Based on this information, which item would the assessor MOST LIKELY request when preparing to conduct a Level 2 Assessment?

Options:
A.

A list of objectives

B.

A manual for each system

C.

A preliminary list of the anticipated evidence

D.

A list of assets that are determined to be out-of-scope

Questions 20

While examining controls on the use of portable storage devices, an assessor conducts an interview with a mid-level internal system administrator. The administrator describes the process to check out portable storage devices, which includes a user emailing IT staff directly, verifying that the media classification label matches the data classification, and limiting use of the device to a specified external system.

What is a MISSING element for the assessment of AC.L2-3.1.21: Portable Storage Use?

Options:
A.

Method of destruction of portable storage devices

B.

Recorded management authorization for the use of portable storage devices

C.

An inventory of portable storage devices provided by the National Security Agency

D.

A directory of personnel background checks to be consulted prior to device checkout

Exam Code: CMMC-CCA
Certification Provider: Cyber AB
Exam Name: Certified CMMC Assessor (CCA) Exam
Last Update: Sep 12, 2025
Questions: 150

Cyber AB Related Exams

How to pass Cyber AB CMMC-CCP - Certified CMMC Professional (CCP) Exam Exam

Cyber AB Free Exams

Cyber AB Free Exams