Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which phase of the CMMC Assessment Process includes the task to identify, obtain inventory, and verify evidence?

A.

Phase 1: Plan and Prepare Assessment

B.

Phase 2: Conduct Assessment

C.

Phase 3: Report Recommended Assessment Results

D.

Phase 4: Remediation of Outstanding Assessment Issues

A C3PAO is conducting High Level Scoping for an OSC that requested an assessment Which term describes the people, processes, and technology that will be applied to the contract who are requesting a CMMC Level assessment?

A.

Host Unit

B.

Branch Office

C.

Coordinating Unit

D.

Supporting Organization/Units

Which statement BEST describes the key references a Lead Assessor should refer to and use the:

A.

DoD adequate security checklist for covered defense information.

B.

CMMC Model Overview as it provides assessment methods and objects.

C.

safeguarding requirements from FAR Clause 52.204-21 for a Level 2 Assessment.

D.

published CMMC Assessment Guide practice descriptions for the desired certification level.

Which NIST SP discusses protecting CUI in nonfederal systems and organizations?

A.

NIST SP 800-37

B.

NIST SP 800-53

C.

NIST SP 800-88

D.

NIST SP 800-171

Evidence gathered from an OSC is being reviewed. Based on the assessment and organizational scope, the Lead Assessor requests the Assessment Team to verify that the coverage by domain, practice. Host Unit. Supporting Organization/Unit, and enclaves are comprehensive enough to rate against each practice. Which criteria is the assessor referring to?

A.

Adequacy

B.

Capability

C.

Sufficiency

D.

Objectivity

The IT manager is scoping the company's CMMC Level 1 Self-Assessment. The manager considers which servers, laptops. databases, and applications are used to store, process, or transmit FCI. Which asset type is being considered by the IT manager?

A.

ESP

B.

People

C.

Facilities

D.

Technology

The CMMC Level 2 assessment methods include examination and can include:

A.

documents, mechanisms, or activities.

B.

specific hardware, software, or firmware safeguards employed within a system.

C.

policies, procedures, security plans, penetration tests, and security requirements.

D.

observation of system backup operations, exercising a contingency plan, and monitoring network traffic.

After completing a Level 2 Assessment, a C3PAO is preparing to upload the Assessment Results Package to Enterprise Mission Assurance Support Service. Which document MUST be included as part of the final assessment results package?

A.

Final Report

B.

Certification rating

C.

Summary-level findings

D.

All Daily Checkpoint logs

Who is responsible for ensuring that subcontractors have a valid CMMC Certification?

A.

CMMC-AB

B.

OUSDA & S

C.

DoD agency or client

D.

Contractor organization

Exercising due care to ensure the information gathered during the assessment is protected even after the engagement has ended meets which code of conduct requirement?

A.

Availability

B.

Confidentiality

C.

Information Integrity

D.

Respect for Intellectual Property