Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Where can a listing of all federal agencies' CUI indices and categories be found?

A.

32 CFR Section 2002

B.

Official CUI Registry

C.

Executive Order 13556

D.

Official CMMC Registry

Which statement BEST describes the key references a Lead Assessor should refer to and use the:

A.

DoD adequate security checklist for covered defense information.

B.

CMMC Model Overview as it provides assessment methods and objects.

C.

safeguarding requirements from FAR Clause 52.204-21 for a Level 2 Assessment.

D.

published CMMC Assessment Guide practice descriptions for the desired certification level.

When are data and documents with legacy markings from or for the DoD required to be re-marked or redacted?

A.

When under the control of the DoD

B.

When the document is considered secret

C.

When a document is being shared outside of the organization

D.

When a derivative document's original information is not CUI

The evidence needed for each practice and/or process is weight for:

A.

adequacy and sufficiency.

B.

adequacy and thoroughness.

C.

sufficiency and thoroughness.

D.

sufficiency and appropriateness.

What type of information is NOT intended for public release and is provided by or generated for the government under a contract to develop or deliver a product or service to the government, but not including information provided by the government to the public (such as on public websites) or simple transactional information, such as necessary to process payments?

A.

CDI

B.

CTI

C.

CUI

D.

FCI

A Lead Assessor has been assigned to a CMMC Assessment During the assessment, one of the assessors approaches with a signed policy. There is one signatory, and that person has since left the company. Subsequently, another person was hired into that position but has not signed the document. Is this document valid?

A.

The signatory is the authority to implement and enforce the policy, and since that person is no longer with the company, the policy is not valid.

B.

More research on the company policy of creating, implementing, and enforcing policies is needed. If the company has a policy identifying the authority as with the position or person, then the policy is valid.

C.

The signatory does not validate or invalidate the policy. For the purpose of this assessment, ensuring that the policy is current and is being implemented by the individuals who are performing the work is sufficient.

D.

The authority to implement and enforce lies with the position, not the person. As long as that position's authority and responsibilities have not been removed from implementing that domain, it is still a valid policy.

A C3PAO is near completion of a Level 2 Assessment for an OSC. The CMMC Findings Brief and CMMC Assessment Results documents have been developed. The Final Recommended Assessment Results are being generated. When generating these results, what MUST be included?

A.

An updated Assessment Plan

B.

Recorded and final updated Daily Checkpoint

C.

Fully executed CMMC Assessment contract between the C3PAO and the OSC

D.

Review documentation for the CMMC Quality Assurance Professional (CQAP)

A defense contractor needs to share FCI with a subcontractor and sends this data in an email. The email system involved in this process is being used to:

A.

manage FCI.

B.

process FCI.

C.

transmit FCI.

D.

generate FCI

A Lead Assessor is presenting an assessment kickoff and opening briefing. What topic MUST be included?

A.

Gathering evidence

B.

Review of the OSC's SSP

C.

Overview of the assessment process

D.

Examination of the artifacts for sufficiency

Two network administrators are working together to determine a network configuration in preparation for CMMC. The administrators find that they disagree on a couple of small items. Which solution is the BEST way to ensure compliance with CMMC?

A.

Consult with the CEO of the company.

B.

Consult the CMMC Assessment Guides and NIST SP 800-171.

C.

Go with the network administrator's ideas with the least stringent controls.

D.

Go with the network administrator's ideas with the most stringent controls.