New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which statement BEST describes an assessor's evidence gathering activities?

A.

Use interviews for assessing a Level 2 practice.

B.

Test all practices or objectives for a Level 2 practice

C.

Test certain assessment objectives to determine findings.

D.

Use examinations, interviews, and tests to gather sufficient evidence.

Which principles are included in defining the CMMC-AB Code of Professional Conduct?

A.

Objectivity, classification, and information accuracy

B.

Objectivity, confidentiality, and information integrity

C.

Responsibility, classification, and information accuracy

D.

Responsibility, confidentiality, and information integrity

When assessing SI.L2-3.14.6: Monitor communications for attack, the CCA interviews the person responsible for the intrusion detection system and examines relevant policies and procedures for monitoring organizational systems. What would be a possible next step the CCA could conduct to gather sufficient evidence?

A.

Conduct a penetration test

B.

Interview the intrusion detection system's supplier.

C.

Upload known malicious code and observe the system response.

D.

Review an artifact to check key references for the configuration of the IDS or IPS practice for additional guidance on intrusion detection and prevention systems.

When are data and documents with legacy markings from or for the DoD required to be re-marked or redacted?

A.

When under the control of the DoD

B.

When the document is considered secret

C.

When a document is being shared outside of the organization

D.

When a derivative document's original information is not CUI

While developing an assessment plan for an OSC. it is discovered that the certified assessor will be interviewing a former college roommate. What is the MOST correct action to take?

A.

Do not inform the OSC and the C3PAO of the possible conflict of interest, and continue as planned.

B.

Inform the OSC and the C3PAO of the possible conflict of interest, and start the entire process over without the conflicted team member.

C.

Inform the OSC and the C3PAO of the possible conflict of interest but since it has been an acceptable amount of time since college, no conflict of interest exists, and continue as planned.

D.

Inform the OSC and the C3PAO of the possible conflict of interest, document the conflict and mitigation actions in the assessment plan, and if the mitigation actions are acceptable, continue with the assessment.

Which example represents a Specialized Asset?

A.

SOCs

B.

Hosted VPN services

C.

Consultants who provide cybersecurity services

D.

All property owned or leased by the government

An OSC receives an email with "CUI//SP-PRVCY//FED Only" in the body of the message Which organization's website should the OSC go to identify what this marking means?

A.

NARA

B.

CMMC-AB

C.

DoD Contractors FAQ page

D.

DoD 239.7601 Definitions page

Which words summarize categories of data disposal described in the NIST SP 800-88 Revision 1. Guidelines for Media Sanitation?

A.

Clear, purge, destroy

B.

Clear redact, destroy

C.

Clear, overwrite, purge

D.

Clear, overwrite, destroy

A C3PAO is near completion of a Level 2 Assessment for an OSC. The CMMC Findings Brief and CMMC Assessment Results documents have been developed. The Final Recommended Assessment Results are being generated. When generating these results, what MUST be included?

A.

An updated Assessment Plan

B.

Recorded and final updated Daily Checkpoint

C.

Fully executed CMMC Assessment contract between the C3PAO and the OSC

D.

Review documentation for the CMMC Quality Assurance Professional (CQAP)

Where does the requirement to include a required practice of ensuring that personnel are trained to carry out their assigned information security-related duties and responsibilities FIRST appear?

A.

Level 1

B.

Level 2

C.

Level 3

D.

All levels