Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An OSC has a testing laboratory. The lab has several pieces of equipment, including a workstation that is used to analyze test information collected from the test equipment. All equipment is on the same VLAN that is part of the certification assessment. The OSC claims that the workstation is part of the test equipment (Specialized Asset) and only needs to be addressed under risk-based security policies. However, the OSC states that the data analysis output is CUI. What is the assessor’s BEST response?

A.

Disagree with the OSC and include the workstation in the full assessment.

B.

Disagree with the OSC and score practice CA.L2-3.12.4: System Security Plan as NOT MET.

C.

Agree with the OSC but perform a limited check of the system, not increasing the assessment cost or duration.

D.

Agree with the OSC and determine if it is managed using the contractor’s risk-based information security procedures and practices.

During an assessment, an assessor is trying to determine if the organization provides protection from malicious code at appropriate locations within organizational information systems. The assessor has decided to use the Interview method to gather evidence. It is BEST to interview:

A.

System developers

B.

System or network administrators

C.

Personnel with audit and accountability responsibilities

D.

Personnel with security alert and advisory responsibilities

While reviewing CA.L2-3.12.3: Security Control Monitoring, the CCA notices that the assessment period is defined as one year. An OSC's SSP states that under CA.L2-3.12.3, security controls are monitored using the same one-year periodicity to ensure the continued effectiveness of the controls. The assessor understands that some CMMC practices can reference other practices for the entirety of their implementation. Is the OSC’s implementation under CA.L2-3.12.3: Security Control Monitoring acceptable?

A.

No, even when referencing other practices more description is always needed.

B.

No, monitoring must be conducted on an ongoing basis to ensure continued effectiveness.

C.

Yes, a one-year period for security control monitoring is acceptable.

D.

Yes, as long as CA.L2-3.12.1 has been scored as MET, they do need to be monitored.

The OSC prints out documents it receives via email that are marked as CUI. According to MP.L2-3.8.4: Media Markings,

what should the Assessor expect to see on the printouts?

A.

A red stamp that states the document contains CUI

B.

Written limitations to the distribution of the CUI within the OSC

C.

The original markings that were on the document emailed to the OSC

D.

The original markings from the document and a distribution list with limitations

During an assessment, the IT security engineers responsible for password policy for the OSC provided documentation that all passwords are protected using a one-way hashing methodology. As a result, which statement is true?

A.

Passwords are protected in storage and in transit.

B.

Passwords are transmitted across the network as clear cipher-text.

C.

The password protection allows access but not authorization to assets.

D.

The transformation makes it impossible to re-convert the hashed password.

A manufacturing company is seeking Level 2 certification. The loading docks are currently accessible directly from the company’s main parking lot, which may lead to unauthorized access to facilities. Based on this information, how should this method be modified to BEST meet Level 2 requirements?

A.

Implement physical perimeter controls, such as turnstiles, to limit access.

B.

Require visitors to check in at the reception desk and maintain a visitor log.

C.

Implement physical perimeter controls, such as cameras, to limit access to only authorized personnel.

D.

Implement physical perimeter controls, such as a gate with a badge system, to limit access to only authorized personnel.

A company is undergoing a CMMC Level 2 Assessment. The Assessment Team is planning and preparing the assessment. Who is responsible for identifying methods, techniques, and responsibilities for collecting, managing, and reviewing evidence?

A.

Lead Assessor

B.

Assessment Team Member

C.

C3PAO Quality Oversight Manager

D.

CMMC Quality Assurance Professional

An OSC has a minimal physical footprint consisting only of network equipment, workstations, and a centralized domain environment. File storage is centralized in a third-party vendor’s FedRAMP Moderate authorized cloud environment, and employees access files using the cloud integration with their workstations. Since CUI is stored in the FedRAMP Moderate authorized environment, the OSC should prepare to have which environment(s) assessed?

A.

Cloud environment only

B.

OSC’s physical network only

C.

Cloud environment and the OSC’s physical network

D.

OSC’s physical network, the cloud environment, and the cloud vendor’s employee network

During an assessment, the team is interviewing the IT staff to understand the ways in which the organization protects backup data. Because the company’s backups contain CUI, the Lead Assessor asks the IT engineer which method is used to ensure that the confidentiality of the backup data is being protected. Which implementation is LEAST LIKELY to be acceptable?

A.

Alternative physical controls for site access

B.

Managing who has access to the information

C.

Physically securing devices and media that contain CUI

D.

Encrypting files or media using industry-standard encryption

A Lead Assessor is preparing to conduct a Level 2 Assessment for an OSC. During the planning phase, the Lead Assessor and OSC have:

    Developed evidence collection approach;

    Identified the team members, resources, schedules, and logistics;

    Identified and managed conflicts of interest;

    Gained access to the OSC’s relevant documentation.

Based on the information provided, which would be an additional element to be discussed during the planning phase of the assessment?

A.

Identify and document evidence gaps

B.

Describe the assessment appeals

C.

Estimate a rough order-of-magnitude (ROM) cost for the assessment

D.

Determine FedRAMP MODERATE equivalency for Cloud computing provider