Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

CMMC-CCA Certified CMMC Assessor (CCA) Exam Questions and Answers

Questions 4

During the assessment of a company, the CCA learns that 50% of employees work from home using remote access. After reviewing the Access Control policy and audit logs, the CCA is unsure how the system ensures only employees with correct privileges can access CUI. The CCA decides a Test of functionality is required. Which question is of the LEAST concern to the CCA?

Options:

A.

Are remote access sessions necessary?

B.

Are remote access sessions permitted?

C.

Are remote access sessions monitored?

D.

Are the types of permitted remote access identified?

Buy Now
Questions 5

In order to assess whether an OSC meets AC.L2-3.1.5: Least Privilege, what should be examined by the Assessor?

Options:

A.

Authentication policy

B.

System configurations for all systems

C.

User access lists that identify privileged users

D.

List of terminated employees over the last three months

Buy Now
Questions 6

A CCA is asked to validate if an OSC has separated their systems containing CUI from other departments’ systems on their local network. Which of the following MUST the CCA assess?

Options:

A.

Area Network (WAN)

B.

Virtual Private Network (VPN)

C.

Virtual Local Area Network (VLAN)

D.

Network Address Translation (NAT)

Buy Now
Questions 7

A CCA is assessing the implementation of SC.L2-3.13.7: Split Tunneling control via the examine method. Which scenario MUST be correct to determine if the practice is MET?

Options:

A.

The CCA tested that VPN mechanisms disallow split tunneling.

B.

The CCA corroborated that split tunneling is disabled with a system or network administrator.

C.

The CCA determined that split tunneling mechanisms have been disabled based on the system hardware, software, and architecture.

D.

The CCA evaluated that split tunneling mechanisms have been disabled based on the mechanisms supporting or restricting non-remote connections.

Buy Now
Questions 8

The Lead Assessor is planning to conduct an assessment for an OSC. The Assessor has been given a preliminary asset inventory list by the OSC. How would the Lead Assessor determine if any assets are out-of-scope for the assessment?

Options:

A.

All assets in an OSC’s inventory fall within the scope of the assessment and, as such, should be assessed against the CMMC practices.

B.

None of the assets in an OSC’s inventory fall within the scope of the assessment and, as such, should not be assessed against the CMMC practices.

C.

Assets cannot process, store, or transmit CUI because they are physically or logically separated from CUI assets, or they are inherently unable to do so.

D.

Out-of-Scope Assets can process, store, or transmit CUI because they do not need to be physically or logically separated.

Buy Now
Questions 9

An OSC has a minimal physical footprint consisting only of network equipment, workstations, and a centralized domain environment. File storage is centralized in a third-party vendor’s FedRAMP Moderate authorized cloud environment, and employees access files using the cloud integration with their workstations. Since CUI is stored in the FedRAMP Moderate authorized environment, the OSC should prepare to have which environment(s) assessed?

Options:

A.

Cloud environment only

B.

OSC’s physical network only

C.

Cloud environment and the OSC’s physical network

D.

OSC’s physical network, the cloud environment, and the cloud vendor’s employee network

Buy Now
Questions 10

A cloud-native OSC uses a vendor’s FedRAMP MODERATE authorized cloud environment for all aspects of their CUI needs (identity, email, file storage, office suite, etc.) as well as the vendor’s locally installable applications. The OSC properly configured the vendor’s cloud-based SIEM system to monitor all aspects of the cloud environment. The OSC’s SSP documents SI.L2-3.14.7: Identify Unauthorized Use, defining authorized use and referencing procedures for identifying unauthorized use.

How should the Certified Assessor score this practice?

Options:

A.

NOT MET because logs from physical infrastructure are not captured by the SIEM.

B.

NOT MET because locally installable applications from a cloud-native environment are not allowed.

C.

MET because being cloud-native is a great way to contain risk to a vendor’s environment.

D.

MET because the cloud SIEM is configured to monitor all of the vendor’s cloud environment.

Buy Now
Questions 11

An Assessment Team is holding a discussion with the system administrator at the OSC to understand their process for ensuring unauthorized users are not able to access CUI.

Which assessment method is being utilized?

Options:

A.

Test method

B.

Observe method

C.

Examine method

D.

Interview method

Buy Now
Questions 12

An assessor is examining an organization’s system maintenance program. While reviewing the system maintenance policy and the OSC’s maintenance records for the CUI network, the assessor notices there is no mention of printers. The assessor asks the IT manager if the company has any printers.

Why is the assessor concerned if the OSC has printers?

Options:

A.

Printers must be completely isolated from all non-CUI assets.

B.

Firmware on a network printer needs to have updates as needed.

C.

Printers cannot be used on a CUI network without government approval.

D.

Printers can produce hard copies of CUI data that need to be safeguarded.

Buy Now
Questions 13

The OSC POC has prepared evidence from an internal pre-assessment for the C3PAO in preparation for a third-party assessment. The OSC POC has identified that there are several ESPs (External Service Providers) involved in protecting the security of the infrastructure. While reviewing the pre-assessment documentation regarding ESPs, the Lead Assessor will be looking for items that are:

Options:

A.

Noted as inherited

B.

Marked as requiring a waiver

C.

Marked as NOT APPLICABLE

D.

Noted as partially implemented

Buy Now
Questions 14

A Lead Assessor is preparing to conduct a Level 2 Assessment for an OSC. The assessor already determined the assessment scope and systems included. In addition, the assessor requests:

    Results of the most recent OSC self-assessment or any pre-assessments by an RPO,

    The System Security Plan (SSP), and

    A list of all OSC staff who play a role in in-scope procedures.

Based on this information, which item would the assessor MOST LIKELY request when preparing to conduct a Level 2 Assessment?

Options:

A.

A list of objectives

B.

A manual for each system

C.

A preliminary list of the anticipated evidence

D.

A list of assets that are determined to be out-of-scope

Buy Now
Questions 15

What should the Lead Assessor do to BEST ensure the evidence supplied effectively meets the intent of the standard for a practice?

Options:

A.

Ensure the evidence for each objective under a practice is adequate.

B.

Ensure the evidence is sufficient to meet the requirements for a practice.

C.

Ensure the evidence is complete, validated, and can be mapped to the practice requirements.

D.

Ensure the evidence covers all the scope and the identified organizations and corresponds to the practice and objectives.

Buy Now
Questions 16

The OSC prints out documents it receives via email that are marked as CUI. According to MP.L2-3.8.4: Media Markings,

what should the Assessor expect to see on the printouts?

Options:

A.

A red stamp that states the document contains CUI

B.

Written limitations to the distribution of the CUI within the OSC

C.

The original markings that were on the document emailed to the OSC

D.

The original markings from the document and a distribution list with limitations

Buy Now
Questions 17

What is NOT required for the Lead Assessor to confirm when verifying readiness to conduct an assessment?

Options:

A.

That risks have been identified

B.

That necessary logistics have been arranged

C.

Whether the OSC can better meet the targeted CMMC Level

D.

That evidence is available and accessible for the targeted CMMC Level

Buy Now
Questions 18

An OSC seeking Level 2 certification is migrating to a fully cloud-based environment. The organization wants to select a Cloud Service Provider (CSP) that can share responsibilities for CMMC Level 2 requirements. Assume both CSPs can equally provide the technical capabilities and business value required.

    CSP A has SOC 2 certification and is California Consumer Privacy Act (CCPA) and Health Insurance Portability and Accountability Act (HIPAA) compliant.

    CSP B has SOC 2 and FedRAMP Moderate certifications.

Based on this information, which CSP is MOST LIKELY to be acceptable?

Options:

A.

CSP A

B.

CSP B

C.

Both CSP A and B

D.

Neither CSP A nor B

Buy Now
Questions 19

The Lead Assessor is reviewing the Assessment Plan to identify people for interviews regarding a specific Level 2 practice. Some OSC personnel previously interviewed provided only brief answers without meaningful verification. What can the Lead Assessor do to improve this situation going forward?

Options:

A.

Ensure the people from the training matrix are made available

B.

Ensure and verify confidentiality and non-attribution of responses

C.

Ensure the respondents sign a non-disclosure agreement for the OSC

D.

Ensure and verify the responses map to the documented artifacts

Buy Now
Questions 20

The OSC has not implemented cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission, citing the use of alternative physical safeguards.

Which of the following is NOT an alternative physical safeguard in this scenario?

Options:

A.

Trusted couriers

B.

Lockable casings

C.

Physical access site monitoring

D.

Tamper protections technologies

Buy Now
Questions 21

A company seeking Level 2 certification has several telecommunications closets throughout its office building. The closets contain network systems and devices that are used to transmit CUI. Which method would be BEST to ensure that only authorized personnel can access the network systems and devices housed within the closets?

Options:

A.

Label the door with “Authorized Personnel Only” and maintain an authorized personnel list.

B.

Install locks with badge readers on the closet doors and maintain an authorized list.

C.

Install security cameras to monitor closet entrances and maintain an authorized personnel list.

D.

Install keypad door locks on the closet doors and only provide the code to IT department personnel.

Buy Now
Questions 22

An OSC seeking Level 2 certification is reviewing the physical security of their building. Currently, the building manager unlocks and locks the doors for business operations. The OSC would like the ability to automatically unlock the door for authorized personnel, track access individually, and maintain access history for all personnel. The BEST approach is for the OSC to:

Options:

A.

Maintain a list of authorized personnel and assign them a building key.

B.

Maintain security cameras to continuously monitor access to the building.

C.

Install a badge system and require each individual to use their badge to gain entry to the building.

D.

Install a keypad system and require the entry code to be changed when an individual leaves the company.

Buy Now
Questions 23

An OSC leases several servers and rack space in a FedRAMP MODERATE authorized colocation data center. Additional servers operate in a LAN room within the company’s facility. Both facilities are within the OSC’s assessment boundary. In order to assess the physical protection of the environment, the Assessor MUST physically examine the visitor and access controls in place in the:

Options:

A.

Data center

B.

OSC’s facility

C.

OSC’s facility and the data center

D.

OSC’s facility and the data center’s customer relationship management regarding physical security

Buy Now
Questions 24

During an assessment, the Lead Assessor determines certain assets to be in-scope which the OSC had considered out-of-scope.

The CCA should reply that for assets to be considered out-of-scope they:

Options:

A.

Provide security protections to CUI assets.

B.

Do not provide security protections for CUI assets.

C.

Can, but are not intended to, process, store, or transmit CUI.

D.

Are not required to be physically or logically separated from CUI assets.

Buy Now
Questions 25

During a CMMC Assessment, the assessor is determining if the Escort Visitors practice is MET. Personnel with which of the following responsibilities would be MOST appropriate to interview?

Options:

A.

Repair and facilities maintenance

B.

Local access control and information security

C.

Physical access control and information security

D.

Information technology management and operations

Buy Now
Questions 26

An assessor is trying to determine if an OSC performs scans of their information system and real-time scans of files from external sources as files are downloaded or executed.

Which evidence is LEAST LIKELY to help this assessor?

Options:

A.

System configuration settings

B.

System Information and Integrity Policy

C.

Alerts from the anti-virus software

D.

Interviews with personnel with configuration management responsibility

Buy Now
Questions 27

The OSC has changed its manner of operations in the past year to isolate its manufacturing division (which handles CUI) from its managerial team (which does not). Upon review of the provided information, the Lead Assessor was unable to identify this isolation in the environment. Which step should the Assessor take NEXT to understand how the current documentation isolates the operational components?

Options:

A.

Review the network or topology diagrams

B.

Review the change tickets and inventory updates

C.

Review the SSP

D.

Review to confirm the baseline configurations exist

Buy Now
Questions 28

A Lead Assessor is preparing to conduct a Level 2 Assessment for an OSC. During the planning phase, the Lead Assessor and OSC have:

    Developed evidence collection approach;

    Identified the team members, resources, schedules, and logistics;

    Identified and managed conflicts of interest;

    Gained access to the OSC’s relevant documentation.

Based on the information provided, which would be an additional element to be discussed during the planning phase of the assessment?

Options:

A.

Identify and document evidence gaps

B.

Describe the assessment appeals

C.

Estimate a rough order-of-magnitude (ROM) cost for the assessment

D.

Determine FedRAMP MODERATE equivalency for Cloud computing provider

Buy Now
Questions 29

An in-house compliance expert for a large defense contractor is reviewing the organization’s training materials for personnel handling CUI. After a widely publicized insider threat incident, management requires that training address insider threat risks. What is a critical component of insider threat awareness training?

Options:

A.

A bounty system for identifying and stopping insider threats

B.

A company-wide ranking of individuals by insider threat risk

C.

Law enforcement case studies on known insider threat activities

D.

Processes and procedures for reporting suspected insider threat activity

Buy Now
Questions 30

Some OSCs share real estate with other companies. To protect FCI/CUI behind unmanned entrances to buildings, floors, or other areas where FCI/CUI is created, used, stored, or transmitted, which of the following is the BEST method?

Options:

A.

Turnstiles to limit access

B.

Cameras to monitor and record foot traffic

C.

Bold signage with strong language to discourage entry

D.

One-way gates which require proper credentials or intercom authorization to unlock and permit entry

Buy Now
Questions 31

An organization has contracted with a third party for system maintenance and support. The third-party personnel all work remotely. Which of the following should an assessor assure is in place?

Options:

A.

Only third-party personnel can perform system maintenance functions.

B.

Third-party personnel need to be identified and monitored while performing maintenance.

C.

The number of third-party personnel who can access the organization’s systems concurrently is limited.

D.

Remote access to systems used by the third party for maintenance functions is terminated automatically based on a defined set of criteria.

Buy Now
Questions 32

During an assessment, the IT security engineers responsible for password policy for the OSC provided documentation that all passwords are protected using a one-way hashing methodology. As a result, which statement is true?

Options:

A.

Passwords are protected in storage and in transit.

B.

Passwords are transmitted across the network as clear cipher-text.

C.

The password protection allows access but not authorization to assets.

D.

The transformation makes it impossible to re-convert the hashed password.

Buy Now
Questions 33

When preparing for an assessment, the assessor determines that the client’s proprietary data resides within an enclave. However, the assessor is unable to review policies containing proprietary data onsite and plans to have the policies copied on removable media by the client’s IT staff, whom they are scheduled to interview. What should the assessor consider as part of their planning?

Options:

A.

No proprietary data can leave the client’s environment under any circumstances.

B.

The assessor can transmit data outside the client’s environment if the client’s IT support staff grants access.

C.

No proprietary data can leave the client’s environment without the express written consent of the OSC POC.

D.

No proprietary data can leave the client’s environment without the express written consent of the OSC Assessment Official.

Buy Now
Questions 34

The Lead Assessor is ready to complete planning by developing the assessment schedule. The Lead Assessor and the OSC Assessment Official discuss the Assessment Team members.

What MUST be submitted to the Cyber-AB before the assessment?

Options:

A.

Individual travel plans

B.

Non-disclosure agreements

C.

Verified NIST SP 800-171 assessor qualifications

D.

Absence of Conflict of Interest and Confirmation Statement

Buy Now
Questions 35

During a CMMC Level 2 Assessment, a CCA interviewed a system administrator on the OSC’s procedures around configuration management and endpoint security. The system administrator described how they build and deploy new systems, and noted that some users require specialized applications for their jobs. Users have been asked to email IT when they install and run an additional application so IT can add it to their list of allowed software.

What must the CCA conclude?

Options:

A.

The OSC has properly implemented application deny listing.

B.

The OSC has not properly implemented application allow listing.

C.

IT must deploy an application to report newly installed software.

D.

IT does not have a policy that users notify IT when they install new applications.

Buy Now
Questions 36

The OSC has assembled its documentation relating to how it controls remote access for assessment. The Lead Assessor compared this documentation to the provided topology map and noted several indications of external connections with External Service Providers (ESPs). Which document is MOST LIKELY to show acceptable evidence of the security controls related to the interface between the OSC and the ESP?

Options:

A.

OSC’s access control policy

B.

Interconnection agreement with ESPs

C.

Technical design of the security of the available VPN

D.

Instructions provided to the OSC from the ESP to implement remote access

Buy Now
Questions 37

During an assessment, the OSC person being interviewed explains the process for escorting visitors. The individual states that while all visitors are escorted, occasionally a vendor may need access to a small room with only one door and limited standing room. In these cases, the escort sits outside the room and observes the vendor completing the work. Is this practice in line with the escort policy?

Options:

A.

No, the escort is not allowed to sit down

B.

No, the escort must always be in the same room

C.

Yes, since the visitor can only use a single entry

D.

Yes, so long as the visitor’s actions can still be viewed by the escort

Buy Now
Questions 38

Does CMMC Level 2 require that a Cloud Service Provider (CSP) hold a FedRAMP HIGH authorization hosted in a government community cloud (GCC)?

Options:

A.

No. The CSP can obtain a FedRAMP MODERATE equivalency.

B.

No. The CSP must hold a FedRAMP MODERATE authorization.

C.

Yes. FedRAMP HIGH is required for CUI data controls due to the sensitive nature of the Defense Industrial Base systems.

D.

Yes. FedRAMP HIGH authorization demonstrates the CSP compliance with NIST SP 800-53 and SP 800-171 control requirements.

Buy Now
Questions 39

An OSC seeking Level 2 certification has a fully cloud-based environment. The assessor must evaluate fulfillment of Level 2 requirements the OSC implements versus those handled by the cloud service provider. Which document would be BEST to identify the Level 2 requirements handled by the OSC’s cloud provider?

Options:

A.

Zero Trust Architecture

B.

Shared Responsibility Matrix

C.

Cloud Security Baseline White Paper

D.

Identity and Access Management (IAM) Plan

Buy Now
Questions 40

When a new employee is issued a laptop, only the user’s credentials need to be set up. According to the IT department, the IT manager is the only person who can change laptop setup and user privileges. What documentation should be examined to determine if this is the case?

Options:

A.

System audit logs

B.

Inventory records

C.

Acceptable use policy

D.

Remote access procedures

Buy Now
Questions 41

An OSC has a hardware and software list used to manage company assets. Which is the BEST evidence to show the OSC is managing the system baseline?

Options:

A.

Media protection

B.

Physical protection

C.

Configuration management

D.

Identification and authentication policy

Buy Now
Questions 42

The OSC’s network consists of a single network switch that connects all devices. This includes the OSC’s OT equipment, which processes CUI. The OT controller requires an unsupported operating system.

What can the Lead Assessor BEST conclude about the overall compliance with MA.L2-3.7.1: Perform Maintenance?

Options:

A.

It is MET only if every asset that is not a Specialized Asset is maintained.

B.

It is MET only if the environments are demarcated on the baseline diagram.

C.

It is NOT MET because industrial equipment should not be processing CUI.

D.

It is NOT MET because the OSC has not managed the risk of a CUI system being outdated.

Buy Now
Questions 43

The assessment team has divided responsibilities to review portions of the OSC’s scope, including the Host Unit, the specific enclave, and supporting teams such as a Managed Security Service Provider (MSSP). During evidence review, the team notices that MSSP personnel answered interview questions somewhat differently than OSC personnel. To clarify this inconsistency, the Lead Assessor decides to take all the following steps EXCEPT:

Options:

A.

Review the network diagrams.

B.

Review the agreement with the MSSP.

C.

Review the notes to determine what was different.

D.

Review interview questionnaire consistency.

Buy Now
Questions 44

The audit team is discussing the OSC’s Risk Managed Assets. For these types of assets, the contractor need NOT:

Options:

A.

Provide a network diagram of the assessment scope.

B.

Ensure they are included in the pre-assessment discussion.

C.

Prepare for the assets to be assessed against CMMC practices.

D.

Show how they are being managed using organizational security policies.

Buy Now
Questions 45

During an assessment, the Assessment Team has identified, according to the SSP and network diagram, that there is a mission system that cannot be altered but that has privileged accounts which should have MFA applied. As it is not possible to deploy a typical type of MFA on the mission system, which of the following constitutes a sufficient second factor?

Options:

A.

VPN access to the mission system

B.

User access logs on the mission system

C.

Badge access to the mission system room

D.

Remote access logs on the mission system

Buy Now
Exam Code: CMMC-CCA
Exam Name: Certified CMMC Assessor (CCA) Exam
Last Update: Sep 18, 2025
Questions: 150

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99