Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CMMC-CCA Cyber AB Certified CMMC Assessor (CCA) Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cyber AB CMMC-CCA Certified CMMC Assessor (CCA) Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 3
Total 150 questions

An OSC has a hardware and software list used to manage company assets. Which is the BEST evidence to show the OSC is managing the system baseline?

A.

Media protection

B.

Physical protection

C.

Configuration management

D.

Identification and authentication policy

An OSC has built an enclave for its production environment. The enclave sits behind a firewall, with all equipment connected through a switch. There is a shipping workstation and physically connected label printer (used for the sales system, which does not process CUI) that the OSC claims are Contractor Risk Managed Assets (CRMA). Other than showing that the shipping workstation and label printer are not intended to store or transmit CUI, and documenting them in the SSP,

how BEST would the OSC show that the shipping workstation and label printer are Contractor Risk Managed Assets?

A.

Document in the asset inventory and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

B.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using vendor-recommended risk-based security practices; and include them in the network diagram.

C.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using the organization’s risk-based security policies and procedures; and include them in the network diagram.

D.

Document the shipping workstation and label printer in the asset inventory; show that they are managed using industry risk-based security best practices; and include them in the network diagram to facilitate scoping discussions during the pre-assessment.

Both the SSP and network diagrams presented to the Lead Assessor by the OSC indicate managed service providers (MSPs) within the assessment boundary. In order to BEST understand the impact of the MSPs, what should the Lead Assessor do?

A.

Ascertain what employees the MSP has onsite

B.

Request the customer responsibility matrix related to the MSPs

C.

Review the inventory to see how the assets have been classified

D.

Inspect the other initial documents presented including policies and organization charts

An OSC assigns new hires to work on their hire date. Human Resources ensures that all screening activities are completed before the end of the employees’ first week. How should the CCA score PS.L2-3.9.1: Screen Individuals?

A.

As NOT MET but it can be remediated post-assessment

B.

As NOT MET and this will cause the assessment to fail

C.

As MET since the OSC ensured Human Resources was handling the screening

D.

As NOT MET because all screening must be completed prior to the start of employment

An OSC is presenting evidence of its fulfillment of CM.L2-3.4.1: System Baselining. It provides:

    System inventory records showing additions/removals of machines,

    Software inventory showing installations/removals, and

    A system component installation plan with software needs and user specifications.

What other documentation MUST the company present to illustrate compliance with CM.L2-3.4.1?

A.

Documentation of the physical safeguards protecting the “gold” baseline images

B.

Documentation of a formal baseline review integrated with a system development lifecycle

C.

Documentation of any authorized deviations from the system baselines for end-user computers

D.

Documentation of a formal chain of custody for new hardware on which baselines will be installed

A company has a CUI enclave for handling all CUI processed, stored, and transmitted through the organization. While interviewing the IT manager, the CCA asks how assets that can, but are not intended to, handle CUI are identified. The IT manager refers to the CUI system’s network diagram (which includes these assets) as well as the asset inventory (which lists these assets as Contractor Risk Managed Assets). Which other artifact MUST also mention these assets?

A.

The identification and authentication policy should show how these assets are identified.

B.

The physical protection policy should list these assets as being part of the physical environment of the organization.

C.

The awareness and training program should include these assets so they are covered for all employees.

D.

The SSP should show these assets are managed using the company’s risk-based security policies, procedures, and practices.

The SSP for an OSC undergoing an assessment categorizes a device in the inventory that wirelessly connects to the network. In order to secure the connection of wireless devices that access a system that transmits, stores, or processes CUI, what are the requirements?

A.

Wireless access must be configured to use FIPS 140 validated cryptography.

B.

Wireless users must be vetted, and an Access Control List maintained for access to CUI.

C.

Wireless access must be configured to use FIPS 140 validated cryptography and limited to authenticated users.

D.

Wireless users must be specifically identified in network diagrams and configured to use FIPS 140 validated cryptography.

An OSC has a large multi-building facility. One building is used as the OSC’s data center. A guard is stationed at the entrance to the data center. A vendor engineer comes onsite to perform maintenance on the storage array in the data center. The guard knows the engineer well and has the engineer fill out the visitor log with the contact person’s name and phone number, the reason for the visit, and the date and time. Since the guard has known the engineer for many years, what is the BEST step the guard should take?

A.

Call the contact person and let her know that the engineer is onsite and give the engineer a temporary badge to enter the data center.

B.

Call the operations center to give the engineer temporary access to enter the data center and escort the engineer to the array and leave.

C.

Call the contact person to have her come down and escort the engineer to the array and stay with the engineer until the maintenance is complete.

D.

Call the operations center to have one of the admins escort the engineer to the array and stay with the engineer until the maintenance is complete.

While scoping the assessment, the assessor learns that the OSC uses various cloud-based solutions sporadically as part of its normal course of business. The OSC states that most business is conducted on-premises and that only a small amount of business uses the cloud. The OSC thinks the cloud is only used for system backups, but there are isolated exceptions.

Are the data provided sufficient to determine that the OSC limits connection to external information systems?

A.

No, the OSC stated most of its business is on-premises.

B.

No, the OSC did not fully define the extent external connections are used.

C.

Yes, the OSC confirmed that external connections occur.

D.

Yes, the OSC confirmed that external connections occur for system backups.

While assessing a company, the CCA is determining whether the company controls and manages connections between its corporate network and all external networks. The company has: (1) a strict employee policy prohibiting personal Internet use and personal email on company computers, and (2) firewalls plus a connection allow-list so only authorized external networks can connect to the company network. Are these safeguards sufficient to meet the applicable CMMC requirement?

A.

Yes. The company’s strict employee policy is the best practice for meeting the requirement.

B.

No. The company must isolate its system from all external connections to meet the requirement.

C.

Yes. The company’s firewalls and connection allow-lists are appropriate technical controls to meet the requirement.

D.

No. The company needs full control over all external systems it interfaces with to meet the requirement.

While examining controls on the use of portable storage devices, an assessor conducts an interview with a mid-level internal system administrator. The administrator describes the process to check out portable storage devices, which includes a user emailing IT staff directly, verifying that the media classification label matches the data classification, and limiting use of the device to a specified external system.

What is a MISSING element for the assessment of AC.L2-3.1.21: Portable Storage Use?

A.

Method of destruction of portable storage devices

B.

Recorded management authorization for the use of portable storage devices

C.

An inventory of portable storage devices provided by the National Security Agency

D.

A directory of personnel background checks to be consulted prior to device checkout

While conducting a CMMC Level 2 assessment at a 100-person manufacturing company, the assessor receives a yellow badge labeled “SPECIAL ACCESS.” The assessor observes multiple badge types used by staff and visitors. The client explains that only three badge colors correspond to controlled access (with electronic access), while the rest are identifiers for seniority. How can the assessor BEST verify that the three colors are the only badges capable of accessing controlled areas for CUI-related activities?

A.

Interviewing CUI-cleared staff

B.

Reviewing standard operating procedures for badge issuance

C.

Reviewing retained electronic badge entry logs or audits thereof

D.

Borrowing a badge from another staff member and attempting to enter a controlled space

During a CMMC Level 2 Assessment, a CCA interviewed a system administrator on the OSC’s procedures around configuration management and endpoint security. The system administrator described how they build and deploy new systems, and noted that some users require specialized applications for their jobs. Users have been asked to email IT when they install and run an additional application so IT can add it to their list of allowed software.

What must the CCA conclude?

A.

The OSC has properly implemented application deny listing.

B.

The OSC has not properly implemented application allow listing.

C.

IT must deploy an application to report newly installed software.

D.

IT does not have a policy that users notify IT when they install new applications.

A Lead Assessor is preparing to conduct a Level 2 Assessment for an OSC. During the planning phase, the Lead Assessor and OSC have:

    Developed evidence collection approach;

    Identified the team members, resources, schedules, and logistics;

    Identified and managed conflicts of interest;

    Gained access to the OSC’s relevant documentation.

Based on the information provided, which would be an additional element to be discussed during the planning phase of the assessment?

A.

Identify and document evidence gaps

B.

Describe the assessment appeals

C.

Estimate a rough order-of-magnitude (ROM) cost for the assessment

D.

Determine FedRAMP MODERATE equivalency for Cloud computing provider

The audit team is discussing the OSC’s Risk Managed Assets. For these types of assets, the contractor need NOT:

A.

Provide a network diagram of the assessment scope.

B.

Ensure they are included in the pre-assessment discussion.

C.

Prepare for the assets to be assessed against CMMC practices.

D.

Show how they are being managed using organizational security policies.

A cloud-native OSC uses a vendor’s FedRAMP MODERATE authorized cloud environment for all aspects of their CUI needs (identity, email, file storage, office suite, etc.) as well as the vendor’s locally installable applications. The OSC properly configured the vendor’s cloud-based SIEM system to monitor all aspects of the cloud environment. The OSC’s SSP documents SI.L2-3.14.7: Identify Unauthorized Use, defining authorized use and referencing procedures for identifying unauthorized use.

How should the Certified Assessor score this practice?

A.

NOT MET because logs from physical infrastructure are not captured by the SIEM.

B.

NOT MET because locally installable applications from a cloud-native environment are not allowed.

C.

MET because being cloud-native is a great way to contain risk to a vendor’s environment.

D.

MET because the cloud SIEM is configured to monitor all of the vendor’s cloud environment.

The client has a Supervisory Control and Data Acquisition (SCADA) system as OT to be evaluated as part of its assessment. In reviewing network architecture and conducting interviews, the assessor determines that a firewall separates the SCADA system from the client’s enterprise network and that CUI is not processed by the SCADA system. Based on this information, what is an appropriate outcome?

A.

The assessor includes the OT within the assessment

B.

The assessor determines the SCADA system is out-of-scope for the assessment

C.

The assessor includes all systems identified by the client as part of the assessment

D.

The assessor determines that all Specialized Assets are within the scope of the assessment

An OSC has two business locations. At each location, the OSC has a wireless guest network to which non-OSC employees are allowed access. The guest network is not password protected and it connects devices within the local OSC’s LAN. Based on this information, does the OSC meet the requirements of Level 2 for network access restriction?

A.

No, the OSC needs to go through an additional assessment.

B.

No, the OSC has not met the network access restriction requirements.

C.

Yes, there are no network access restriction requirements.

D.

Yes, the OSC has met the network access restriction requirements.

An assessor is trying to determine if an OSC performs scans of their information system and real-time scans of files from external sources as files are downloaded or executed.

Which evidence is LEAST LIKELY to help this assessor?

A.

System configuration settings

B.

System Information and Integrity Policy

C.

Alerts from the anti-virus software

D.

Interviews with personnel with configuration management responsibility

During an assessment, the IT security engineers responsible for password policy for the OSC provided documentation that all passwords are protected using a one-way hashing methodology. As a result, which statement is true?

A.

Passwords are protected in storage and in transit.

B.

Passwords are transmitted across the network as clear cipher-text.

C.

The password protection allows access but not authorization to assets.

D.

The transformation makes it impossible to re-convert the hashed password.

Page: 2 / 3
Total 150 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved