Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An OSC processes data in its owned data center. The data center includes a very early smoke detection apparatus (VESDA). The apparatus only captures log information from its sensors around the data center. It is not intended, nor capable of, processing CUI. The VESDA is on a separate VLAN and is in a separate locked room in the data center.

Should the assessor agree that the VESDA is out-of-scope?

A.

Yes. The VESDA is physically and logically separated from the other data center equipment, and it is not intended nor capable of processing CUI.

B.

No. Even though the sensors are out-of-scope, the VESDA could provide access to the outside network if sensors were misused, and CUI could be exfiltrated.

C.

No. Even though the VESDA controller is in a locked room and on a separate VLAN, the VESDA is an essential security function as an early warning system.

D.

Yes. The VESDA serves a non-data processing purpose and is only connected to sensors. Sensors are out-of-scope, so the VESDA is out-of-scope.

The OSC POC has prepared evidence from an internal pre-assessment for the C3PAO in preparation for a third-party assessment. The OSC POC has identified that there are several ESPs (External Service Providers) involved in protecting the security of the infrastructure. While reviewing the pre-assessment documentation regarding ESPs, the Lead Assessor will be looking for items that are:

A.

Noted as inherited

B.

Marked as requiring a waiver

C.

Marked as NOT APPLICABLE

D.

Noted as partially implemented

Video monitoring is used by an OSC to help meet PE.L2-3.10.2: Monitor Facility. The OSC’s building has three external doors, each with badge access and a network-connected video camera above the door. The video cameras are connected to the same network as employee computers. The OSC contracted a local security company to provide surveillance services. The security company stores the recordings at its premises and requires access to the OSC’s network to manage the video cameras. Which factor is a clear negative finding for the OSC’s assessment?

A.

Video surveillance needs to be of both private and public areas of the building

B.

A non-certified third party accesses the OSC’s network to manage the cameras

C.

Video surveillance alone does not satisfy the facility monitoring requirement of PE.L2-3.10.2

D.

A non-certified third party’s data center may not store video recordings for a company authorized to process CUI

A C3PAO is conducting a Level 2 assessment of a midsized construction contractor that does both private (commercial) and federal work. The contractor’s documentation states that all CUI flows through a single building on their office campus and is logically, physically, and administratively isolated from the rest of the environment. Why might an assessor request access to assess controls within a building or area not listed as in-scope in the documentation?

A.

If the assessor sees personnel carrying locked cases into the other building or area

B.

If the OSC has an underground passageway connecting the CUI building to a non-CUI building

C.

If network diagrams indicate the commercial and federal sectors share a single Internet connection

D.

If Human Resources that supports both commercial and federal sectors sits in the other building or area

A company seeking Level 2 certification has several telecommunications closets throughout its office building. The closets contain network systems and devices that are used to transmit CUI. Which method would be BEST to ensure that only authorized personnel can access the network systems and devices housed within the closets?

A.

Label the door with “Authorized Personnel Only” and maintain an authorized personnel list.

B.

Install locks with badge readers on the closet doors and maintain an authorized list.

C.

Install security cameras to monitor closet entrances and maintain an authorized personnel list.

D.

Install keypad door locks on the closet doors and only provide the code to IT department personnel.

An OSC has contracted a C3PAO to perform a Level 2 Assessment. As the Lead Assessor is analyzing the assessment requirements, it is found that the OSC does not have a document detailing the assessment scope. How can this problem BEST be fixed?

A.

The Assessment Team is supposed to generate the document before moving forward.

B.

The CCA tells the OSC they must provide the document before the assessment can begin.

C.

The OSC and the Lead Assessor jointly create the document at the beginning of the assessment.

D.

The Lead Assessor can regulate the assessment and create/adjust the document moving forward.

The Lead Assessor is planning to conduct an assessment for an OSC. The Assessor has been given a preliminary asset inventory list by the OSC. How would the Lead Assessor determine if any assets are out-of-scope for the assessment?

A.

All assets in an OSC’s inventory fall within the scope of the assessment and, as such, should be assessed against the CMMC practices.

B.

None of the assets in an OSC’s inventory fall within the scope of the assessment and, as such, should not be assessed against the CMMC practices.

C.

Assets cannot process, store, or transmit CUI because they are physically or logically separated from CUI assets, or they are inherently unable to do so.

D.

Out-of-Scope Assets can process, store, or transmit CUI because they do not need to be physically or logically separated.

A midsized professional services organization that frequently contracts with government entities is undergoing a CMMC Level 2 assessment. The CCA interviews IT leadership about their audit logging capabilities and determines that a third-party vendor is responsible for correlating and reviewing audit logs. During the interview, they discuss the process that has been implemented by the vendor to provide a monthly summary of their audit log review to the organization. What issue should the CCA resolve during the interview?

A.

The vendor has the ability to provide report generation.

B.

The vendor may not use the same authoritative time source.

C.

Audit logs must be reviewed on at least a weekly basis for CMMC requirements.

D.

Audit logs should not be correlated and reviewed by a third party as they may contain CUI.

An OSC has a hardware and software list used to manage company assets. Which is the BEST evidence to show the OSC is managing the system baseline?

A.

Media protection

B.

Physical protection

C.

Configuration management

D.

Identification and authentication policy

An organization’s password policy includes these requirements:

    Passwords must be at least 8 characters in length.

    Passwords must contain at least one uppercase character, one lowercase character, and one numeric digit.

    Passwords must be changed at least every 90 days.

    When a password is changed, none of the previous 3 passwords can be reused.

Per IA.L2-3.5.7: Password Complexity, what requirement is missing from this password policy?

A.

It does not require MFA.

B.

It does not include a list of prohibited passwords.

C.

It does not specify a minimum change of character requirement.

D.

It does not require the password to contain at least one special character.