Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

During an assessment, the Assessment Team has identified, according to the SSP and network diagram, that there is a mission system that cannot be altered but that has privileged accounts which should have MFA applied. As it is not possible to deploy a typical type of MFA on the mission system, which of the following constitutes a sufficient second factor?

A.

VPN access to the mission system

B.

User access logs on the mission system

C.

Badge access to the mission system room

D.

Remote access logs on the mission system

While examining the customer responsibility matrix submitted by the OSC for one of its Cloud Service Providers (CSPs), the Assessor notes that the matrix was substantially completed by the OSC’s RPO. In fact, there is a statement from the RPO that the CSP has met the requirements for FedRAMP MODERATE.

In order to accept that this CSP is qualified to perform some of the practices on behalf of the OSC, what should occur?

A.

The CSP must have its service certified for FedRAMP by a certified C3PAO.

B.

The OSC should provide the contract documents for the CSP specifying that it must meet NIST SP 800-171 practices.

C.

The OSC must be able to demonstrate that the CSP is providing its services in a manner that complies with CMMC Level 2.

D.

There must be other evidence that an independent firm has confirmed the security controls meeting FedRAMP MODERATE are in place.

While onsite conducting a CMMC Level 2 assessment at a small architecture firm that handles DoD construction contracts, the client offers a list of personnel for interviews. To answer questions regarding visitor access controls, which personnel would be MOST appropriate for interviewing?

A.

System Administrator

B.

Front-desk Receptionist

C.

Administrative Assistant

D.

Senior Architecture Partner

In completing the assessment of practices in the Access Control (AC) domain, a CCA scored AC.L2-3.1.15: Privileged Remote Access as NOT MET. The OSC was notified of this deficiency at the end of day two of the assessment. On day five of the assessment, the OSC’s Assessment Official contacted the CCA to provide evidence that the deficiencies have been corrected.

What is the CCA’s NEXT step?

A.

This practice is not eligible for deficiency correction and should be scored as NOT MET.

B.

This practice is not eligible for deficiency correction, should be scored as NOT MET, and reevaluated during a POA&M Close-Out Assessment.

C.

This practice is eligible for deficiency correction and should be scored as MET but must be reevaluated during a POA&M Close-Out Assessment.

D.

This practice is eligible for deficiency correction, should be scored as NOT MET, and evaluated during the Limited Deficiency Correction evaluation.

The client has a Supervisory Control and Data Acquisition (SCADA) system as OT to be evaluated as part of its assessment. In reviewing network architecture and conducting interviews, the assessor determines that a firewall separates the SCADA system from the client’s enterprise network and that CUI is not processed by the SCADA system. Based on this information, what is an appropriate outcome?

A.

The assessor includes the OT within the assessment

B.

The assessor determines the SCADA system is out-of-scope for the assessment

C.

The assessor includes all systems identified by the client as part of the assessment

D.

The assessor determines that all Specialized Assets are within the scope of the assessment

The assessor begins the assessment by meeting with the client’s stakeholders and learns that multiple subsidiaries exist. In order to perform a complete assessment, the assessor must review documents from multiple entities as multiple, corresponding Commercial and Government Entity (CAGE) codes were provided. Which of the following entities may receive certification as a result of this?

A.

HQ organization

B.

HQ organization and Host unit

C.

Host unit and Supporting Organizations/Units

D.

HQ organization, Host unit, and Supporting Organizations/Units

A CCA is assessing the concept of least functionality in accordance with CM.L2-3.4.6: Least Functionality.

Which method is the LEAST LIKELY to be useful as an assessment technique?

A.

Interview personnel with information security responsibilities.

B.

Interview personnel with application development responsibilities.

C.

Interview personnel who wrote the configuration management policy.

D.

Interview personnel with security configuration management responsibilities.

An OSC has a large multi-building facility. One building is used as the OSC’s data center. A guard is stationed at the entrance to the data center. A vendor engineer comes onsite to perform maintenance on the storage array in the data center. The guard knows the engineer well and has the engineer fill out the visitor log with the contact person’s name and phone number, the reason for the visit, and the date and time. Since the guard has known the engineer for many years, what is the BEST step the guard should take?

A.

Call the contact person and let her know that the engineer is onsite and give the engineer a temporary badge to enter the data center.

B.

Call the operations center to give the engineer temporary access to enter the data center and escort the engineer to the array and leave.

C.

Call the contact person to have her come down and escort the engineer to the array and stay with the engineer until the maintenance is complete.

D.

Call the operations center to have one of the admins escort the engineer to the array and stay with the engineer until the maintenance is complete.

What is NOT required for the Lead Assessor to confirm when verifying readiness to conduct an assessment?

A.

That risks have been identified

B.

That necessary logistics have been arranged

C.

Whether the OSC can better meet the targeted CMMC Level

D.

That evidence is available and accessible for the targeted CMMC Level

An OSC has a headquarters (HQ) site and satellite offices A and B. The two satellite offices are connected to the HQ through a VPN. CUI is stored within the HQ LAN room and used by staff at HQ and Site A. When categorizing assets for this assessment, assets at the HQ:

A.

and Site A contain CUI assets and Site B is out of scope.

B.

and Site A and Site B contain CUI assets since all have access to CUI.

C.

contain CUI assets and Site A and Site B contain only Certification in Risk Management Assurance.

D.

and Site A contain CUI assets and Site B contains only Certification in Risk Assurance.