Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

During a Level 2 Assessment, the OSC has provided an inventory list of all hardware. The list includes servers, workstations, and network devices. Why should this evidence be sufficient for making a scoring determination for AC.L2-3.1.19: Encrypt CUI on mobile devices and mobile computing platforms?

A.

The inventory list does not specify mobile devices.

B.

The interviewee attested to encrypting all data at rest.

C.

The inventory list does not include Bring Your Own Devices.

D.

The DoD has accepted an alternative safeguarding measure for mobile devices.

An assessor is collecting affirmations. So far, the assessor has collected interviews, demonstrations, emails, messaging, and presentations. Are these appropriate approaches to collecting affirmations?

A.

No, emails are not appropriate affirmations.

B.

No, messaging is not an appropriate affirmation.

C.

Yes, the affirmations collected by the assessor are all appropriate.

D.

Yes, the affirmations collected by the assessor are all appropriate, as are screenshots.

The results package for a Level 2 Assessment is being submitted. What MUST a Final Report. CMMC Assessment Results include?

A.

Affirmation for each practice or control

B.

Documented rationale for each failed practice

C.

Suggested improvements for each failed practice

D.

Gaps or deltas due to any reciprocity model are recorded as met

There are 15 practices that are NOT MET for an OSC's Level 2 Assessment. All practices are applicable to the OSC. Which determination should be reached?

A.

The OSC may have 90 days for remediating NOT MET practices.

B.

The OSC is not eligible for an option to remediate NOT MET practices.

C.

The OSC may be eligible for an option to remediate NOT MET practices.

D.

The OSC is not eligible for an option to remediate after the assessment is canceled.

What is objectivity as it applies to activities with the CMMC-AB?

A.

Ensuring full disclosure

B.

Reporting results of CMMC services completely

C.

Avoiding the appearance of or actual, conflicts of interest

D.

Demonstrating integrity in the use of materials as described in policy

An organization's sales representative is tasked with entering FCI data into various fields within a spreadsheet on a company-issued laptop. This laptop is an FCI Asset being used to:

A.

process and transmit FCI.

B.

process and organize FCI.

C.

store, process, and transmit FCI.

D.

store, process, and organize FCI.

Which term describes the process of granting or denying specific requests to obtain and use information, related information processing services, and enter specific physical facilities?

A.

Access control

B.

Physical access control

C.

Mandatory access control

D.

Discretionary access control

While conducting a CMMC Assessment, an individual from the OSC provides documentation to the assessor for review. The documentation states an incident response capability is established and contains information on incident preparation, detection, analysis, containment, recovery, and user response activities. Which CMMC practice is this documentation attesting to?

A.

IR.L2-3.6.1: Incident Handling

B.

IR.L2-3.6.2: Incident Reporting

C.

IR.L2-3.6.3: Incident Response Testing

D.

IR.L2-3.6.4: Incident Spillage

Per DoDI 5200.48: Controlled Unclassified Information (CUI), CUI is marked by whom?

A.

DoD OUSD

B.

Authorized holder

C.

Information Disclosure Official

D.

Presidential authorized Original Classification Authority

During a CMMC readiness review, the OSC proposes that an associated enclave should not be applicable in the scope. Who is responsible for verifying this request?

A.

CCP

B.

C3PAO

C.

Lead Assessor

D.

Advisory Board