Month End Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

CMMC-CCA Certified CMMC Assessor (CCA) Exam Questions and Answers

Questions 4

A company is seeking Level 2 CMMC certification. During the Limited Practice Deficiency Correction Evaluation, the Lead Assessor must decide whether the company can move to a POA&M review. Which condition will result in the Lead Assessor recommending that the OSC’s practice deficiencies move to a POA&M review?

Options:

A.

A final score below 88

B.

A final score of 110

C.

A final score of 80 or better

D.

A final score of 88/110 or better

Buy Now
Questions 5

When assessing an environment, the CCA determines that CUI is contained within an IoT device. Which statement MUST be true?

Options:

A.

The IoT device is a Contractor Risk Managed Asset.

B.

The IoT device must be accurately documented within the SSP.

C.

An IoT device may not be utilized to process, store, or transmit CUI.

D.

Access provisioned to the IoT device must be done in accordance with AC.L2-3.1.1: Limit System Access.

Buy Now
Questions 6

While scoring the evidence for a particular CMMC practice, the Certified Assessor notes that one of the practice objectives is NOT MET, thereby scoring the entire practice as NOT MET. The OSC Assessment Official disagrees with the Certified Assessor’s decision, and they both take the dispute to the Lead Assessor, who is unable to resolve the issue to the OSC’s satisfaction.

How will this dispute be settled?

Options:

A.

The Lead Assessor is the final arbiter of the dispute.

B.

The OSC can supply adequate proof to the Cyber-AB to overturn the decision.

C.

The Certified Assessor is certified and, as such, the decision will stand.

D.

The Lead Assessor will present the dispute to the C3PAO Official, who will make a ruling.

Buy Now
Questions 7

During the Planning Phase of the Assessment Plan, the assessor determines that the Client will likely include sensitive and proprietary CUI. What should the assessor consider as part of their virtual data collection techniques for this information?

Options:

A.

The Client is responsible for safeguarding the data during collection, not the assessor.

B.

The assessor is responsible for safeguarding the data during collection, not the client.

C.

The assessor should record the risks and mitigations to protect the CUI categories handled.

D.

The client and assessor should record the risks and mitigations to protect the CUI categories handled.

Buy Now
Questions 8

During an assessment interview, the interviewee states that anyone can connect to the company Wi-Fi without prior approval. Within which domains is the Wi-Fi configuration covered?

Options:

A.

Media Protection (MP), Access Control (AC), and Physical Protection (PE)

B.

Identification and Authentication (IA), Media Protection (MP), and System and Information Integrity (SI)

C.

Access Control (AC), Identification and Authentication (IA), and System and Communications Protection (SC)

D.

System and Communications Protection (SC), System and Information Integrity (SI), and Physical Protection (PE)

Buy Now
Questions 9

While conducting a CMMC Level 2 Assessment for a small waveguide manufacturer, the client provides a copy of their CMMC Level 1 Self-Assessment that their senior official has recently approved and uploaded to the Supplier Performance Risk System (SPRS). What type of information may be covered within the Level 1 Self-Assessment that is OUTSIDE the scope of a Level 2 assessment?

Options:

A.

CUI in paper format

B.

FCI within the CUI production enclave

C.

FCI data within the description in the contractor self-assessment

D.

Sensitive Compartmented Information (SCI) shredded by an approved vendor

Buy Now
Questions 10

An Assessment Team is holding a discussion with the system administrator at the OSC to understand their process for ensuring unauthorized users are not able to access CUI.

Which assessment method is being utilized?

Options:

A.

Test method

B.

Observe method

C.

Examine method

D.

Interview method

Buy Now
Questions 11

During a CMMC Assessment, the assessor is determining if the Escort Visitors practice is MET. Personnel with which of the following responsibilities would be MOST appropriate to interview?

Options:

A.

Repair and facilities maintenance

B.

Local access control and information security

C.

Physical access control and information security

D.

Information technology management and operations

Buy Now
Questions 12

An OSC is a wholly owned subsidiary of a large conglomerate (parent organization). The OSC and the parent organization use ID badges (PKI cards) that contain a PKI certificate and a radio frequency identification (RFID) tag used for building and system access (including systems that process, transmit, or store CUI). The parent organization does not make any decisions on how the OSC runs its security program or other matters of significance. The large conglomerate operates a machine that is used to activate the badges for both itself and the OSC. This machine is isolated in a locked room and has no network connectivity to the OSC.

The badge activation system is:

Options:

A.

In-scope because the parent organization acts as an External Service Provider to the OSC by providing PKI cards.

B.

In-scope because the OSC is part of the large conglomerate and thus any CMMC requirements of the OSC are imputed onto the large conglomerate.

C.

Out-of-scope because the OSC is the one that assigns the appropriate access to a particular PKI card.

D.

Out-of-scope because the badge activation machine is physically and logically isolated from the OSC and it is under the control of the parent organization.

Buy Now
Questions 13

The OSC has assembled its documentation relating to how it controls remote access for assessment. The Lead Assessor compared this documentation to the provided topology map and noted several indications of external connections with External Service Providers (ESPs). Which document is MOST LIKELY to show acceptable evidence of the security controls related to the interface between the OSC and the ESP?

Options:

A.

OSC’s access control policy

B.

Interconnection agreement with ESPs

C.

Technical design of the security of the available VPN

D.

Instructions provided to the OSC from the ESP to implement remote access

Buy Now
Questions 14

A Lead Assessor is conducting an assessment for an OSC. The Lead Assessor is collecting evidence regarding the OSC’s network separation techniques. Which technique would be considered a logical separation technique and would fall within the scope of the assessment?

Options:

A.

Data loss alerting configured at the edge of the network containing CUI assets

B.

Access limitation based on badge access assigned to employees based on role

C.

Role-based access control within a properly implemented identity and access management tool

D.

A proxy-configured firewall that prevents data from flowing along the physical connection path

Buy Now
Questions 15

A C3PAO has contracted by an OSC to perform its assessment. Before the assessment, the Lead Assessor asks the OSC to provide an extensive list of evidence, some of which is optional and beyond the minimum requirements. The OSC is not able to fulfill the entire request. One missing document was a current and organized list of the OSC’s evidence and mappings.

Given that this is a Level 2 Assessment, what should the Lead Assessor tell the OSC?

Options:

A.

“The OSC’s Assessment Official will be asked to collect evidence when requested by the assessment team.”

B.

“The OSC must provide the Assessment Team with hardcopy evidence. Electronic evidence will only be collected when needed.”

C.

“It’s okay that the document is missing. The Assessment Team will collect all evidence themselves to ensure its integrity.”

D.

“The OSC should provide the Assessment Team with a current and organized list of their evidence and process mappings, but the assessment can continue.”

Buy Now
Questions 16

An OSC processes data in its owned data center. The data center includes a very early smoke detection apparatus (VESDA). The apparatus only captures log information from its sensors around the data center. It is not intended, nor capable of, processing CUI. The VESDA is on a separate VLAN and is in a separate locked room in the data center.

Should the assessor agree that the VESDA is out-of-scope?

Options:

A.

Yes. The VESDA is physically and logically separated from the other data center equipment, and it is not intended nor capable of processing CUI.

B.

No. Even though the sensors are out-of-scope, the VESDA could provide access to the outside network if sensors were misused, and CUI could be exfiltrated.

C.

No. Even though the VESDA controller is in a locked room and on a separate VLAN, the VESDA is an essential security function as an early warning system.

D.

Yes. The VESDA serves a non-data processing purpose and is only connected to sensors. Sensors are out-of-scope, so the VESDA is out-of-scope.

Buy Now
Questions 17

What should the Lead Assessor do to BEST ensure the evidence supplied effectively meets the intent of the standard for a practice?

Options:

A.

Ensure the evidence for each objective under a practice is adequate.

B.

Ensure the evidence is sufficient to meet the requirements for a practice.

C.

Ensure the evidence is complete, validated, and can be mapped to the practice requirements.

D.

Ensure the evidence covers all the scope and the identified organizations and corresponds to the practice and objectives.

Buy Now
Questions 18

During discussions with an OSC, the assessment team learned that many employees often need to work from remote locations and, as a result, are permitted to access the organization’s internal networks from those remote locations. To ensure secure remote access requirements are being met, remote access sessions need NOT be:

Options:

A.

Validated

B.

Identified

C.

Permitted

D.

Controlled

Buy Now
Questions 19

Testing is one assessment method the Lead Assessor may choose depending on the assessment scope and evidence provided by the OSC. During the Plan Phase, the Lead Assessor and OSC POC agree on who the people are that are involved in a particular practice so that it could be tested if determined appropriate. During the discussion, the OSC POC tells the Lead Assessor that the production system is in use and cannot be stopped for the testing to take place but offers a mirrored system for testing. The Lead Assessor decides:

Options:

A.

Only to test the processes conducted by the supporting groups

B.

Only to test the Customer Matrices that are available

C.

Not to perform testing as a mirrored system is not an acceptable substitute for the production system

D.

To ask the OSC for evidence that a mirrored system is exactly the same as the production system to conduct testing

Buy Now
Questions 20

The audit team is discussing the OSC’s Risk Managed Assets. For these types of assets, the contractor need NOT:

Options:

A.

Provide a network diagram of the assessment scope.

B.

Ensure they are included in the pre-assessment discussion.

C.

Prepare for the assets to be assessed against CMMC practices.

D.

Show how they are being managed using organizational security policies.

Buy Now
Questions 21

A company describes its organization as having two systems. One system, System Org, covers the entire organization and allows instant messaging, email, and Internet activity. The other system, System CUI, is used for processing, storing, and transmitting CUI data. System CUI interfaces with System Org through security mechanisms and a firewall.

The CMMC Assessment is being done on System CUI only.

What is the BEST way to describe System CUI?

Options:

A.

CUI Assets

B.

In-Scope Assets

C.

Out-of-Scope Assets

D.

CUI Assets and Security Protection Assets

Buy Now
Questions 22

Video monitoring is used by an OSC to help meet PE.L2-3.10.2: Monitor Facility. The OSC’s building has three external doors, each with badge access and a network-connected video camera above the door. The video cameras are connected to the same network as employee computers. The OSC contracted a local security company to provide surveillance services. The security company stores the recordings at its premises and requires access to the OSC’s network to manage the video cameras. Which factor is a clear negative finding for the OSC’s assessment?

Options:

A.

Video surveillance needs to be of both private and public areas of the building

B.

A non-certified third party accesses the OSC’s network to manage the cameras

C.

Video surveillance alone does not satisfy the facility monitoring requirement of PE.L2-3.10.2

D.

A non-certified third party’s data center may not store video recordings for a company authorized to process CUI

Buy Now
Questions 23

The assessment team has divided responsibilities to review portions of the OSC’s scope, including the Host Unit, the specific enclave, and supporting teams such as a Managed Security Service Provider (MSSP). During evidence review, the team notices that MSSP personnel answered interview questions somewhat differently than OSC personnel. To clarify this inconsistency, the Lead Assessor decides to take all the following steps EXCEPT:

Options:

A.

Review the network diagrams.

B.

Review the agreement with the MSSP.

C.

Review the notes to determine what was different.

D.

Review interview questionnaire consistency.

Buy Now
Questions 24

The OSC has changed its manner of operations in the past year to isolate its manufacturing division (which handles CUI) from its managerial team (which does not). Upon review of the provided information, the Lead Assessor was unable to identify this isolation in the environment. Which step should the Assessor take NEXT to understand how the current documentation isolates the operational components?

Options:

A.

Review the network or topology diagrams

B.

Review the change tickets and inventory updates

C.

Review the SSP

D.

Review to confirm the baseline configurations exist

Buy Now
Questions 25

During the assessment of a company, the CCA learns that 50% of employees work from home using remote access. After reviewing the Access Control policy and audit logs, the CCA is unsure how the system ensures only employees with correct privileges can access CUI. The CCA decides a Test of functionality is required. Which question is of the LEAST concern to the CCA?

Options:

A.

Are remote access sessions necessary?

B.

Are remote access sessions permitted?

C.

Are remote access sessions monitored?

D.

Are the types of permitted remote access identified?

Buy Now
Questions 26

During an assessment, the Assessment Team has identified, according to the SSP and network diagram, that there is a mission system that cannot be altered but that has privileged accounts which should have MFA applied. As it is not possible to deploy a typical type of MFA on the mission system, which of the following constitutes a sufficient second factor?

Options:

A.

VPN access to the mission system

B.

User access logs on the mission system

C.

Badge access to the mission system room

D.

Remote access logs on the mission system

Buy Now
Questions 27

An OSC seeking Level 2 certification wants to develop and launch a website for customers to purchase items online and submit contact forms. The OSC plans to host the web server in their own data center while also maintaining the security of their internal IT environment. Based on this information, what would be the BEST approach?

Options:

A.

Relocate the server to a different office location to protect the OSC’s LAN

B.

Configure a DMZ for an additional layer of security to the OSC’s LAN to host the publicly accessible server

C.

Configure a firewall rule to only allow internal traffic to communicate with the server for an additional layer of security to the OSC’s LAN

D.

Configure the server to protect against object reuse and residual information via shared system resources for an additional layer of security to the OSC’s LAN

Buy Now
Questions 28

While conducting a CMMC Level 2 gap analysis with a large defense contractor, a CMMC RP confirms that the organization uses a RADIUS server for authentication. What additional method could be used to comply with AC.L2-3.1.17: Wireless Access Protection?

Options:

A.

Layer 3 switch

B.

Intrusion detection solution

C.

WPA2-Enterprise encryption

D.

Frequency-hopping wireless access

Buy Now
Questions 29

A company has multiple sites with employees at each site that must access the company’s CUI network from their remote locations. The company has set up a single access point for all employees to access the network. What is the MOST significant factor in determining whether the security on this single access point is adequate?

Options:

A.

Remote access is secured and monitored.

B.

Physical access is monitored and controlled.

C.

The security requirements for CUI and FCI are documented.

D.

The remote personnel have notification procedures regarding connection issues.

Buy Now
Questions 30

A company mirrors its FCI/CUI data storage in a cloud environment. Data is managed across multiple virtual machines (VMs). To satisfy requirements for data security of the LOCAL copy using physical controls, what should the OSC do?

Options:

A.

Use encrypted transport and storage of FCI/CUI data on the VMs.

B.

Store FCI/CUI data without encryption for faster access/backup/restore.

C.

Ensure that the VMs are running on hardware that is physically located in a controlled-access facility.

D.

In addition to a password or personal identification number, use physical means to log in such as a smart card or hard token.

Buy Now
Questions 31

An Assessor is examining documents provided by the OSC POC. While reviewing them, the Assessor notes that several of the procedures have very current dates while the bulk do not. What should the Assessor do in order to decide if these new documents are acceptable as evidence?

Options:

A.

Ensure the documents were approved by a senior-level manager.

B.

Determine the outlined reasonableness of the procedures.

C.

Determine if the people involved in writing the procedures are on the list of those who can be interviewed.

D.

Set up an observation session to determine if the procedures are in use and people are knowledgeable of their deployment and use.

Buy Now
Questions 32

While reviewing CA.L2-3.12.3: Security Control Monitoring, the CCA notices that the assessment period is defined as one year. An OSC's SSP states that under CA.L2-3.12.3, security controls are monitored using the same one-year periodicity to ensure the continued effectiveness of the controls. The assessor understands that some CMMC practices can reference other practices for the entirety of their implementation. Is the OSC’s implementation under CA.L2-3.12.3: Security Control Monitoring acceptable?

Options:

A.

No, even when referencing other practices more description is always needed.

B.

No, monitoring must be conducted on an ongoing basis to ensure continued effectiveness.

C.

Yes, a one-year period for security control monitoring is acceptable.

D.

Yes, as long as CA.L2-3.12.1 has been scored as MET, they do need to be monitored.

Buy Now
Questions 33

An OSC creates standard user accounts with limited capabilities and administrator accounts with full system access. A standard user initiates the uninstall of the anti-virus software, which is organizationally defined as a privileged function. Which of the following would indicate AC.L2-3.1.7: Privileged Functions is properly implemented?

Options:

A.

The antivirus software is not uninstalled.

B.

The antivirus software is successfully uninstalled.

C.

The antivirus software is not uninstalled, and the attempt is captured in an application audit log.

D.

The antivirus software is successfully uninstalled, and the event is captured in an application audit log.

Buy Now
Questions 34

Some OSCs share real estate with other companies. To protect FCI/CUI behind unmanned entrances to buildings, floors, or other areas where FCI/CUI is created, used, stored, or transmitted, which of the following is the BEST method?

Options:

A.

Turnstiles to limit access

B.

Cameras to monitor and record foot traffic

C.

Bold signage with strong language to discourage entry

D.

One-way gates which require proper credentials or intercom authorization to unlock and permit entry

Buy Now
Questions 35

An Assessor is evaluating whether an OSC has implemented adequate controls to meet AC.L2-3.1.7: Privileged Functions. The OSC has procedures that define privileged vs. non-privileged account provisioning and an access control policy that restricts execution of certain functions only to privileged users.

What might the Assessor do to further evaluate the implementation of this practice?

Options:

A.

Examine system logs to verify automatic updates are being applied.

B.

Test whether the application of a patch is captured in system logging.

C.

Test whether a non-privileged user can log into a system where CUI is stored.

D.

Examine a user access list for users that are authorized to access a key management system.

Buy Now
Questions 36

A company has a server in its own Virtual Cloud used as a CUI enclave. There is a point-to-point VPN between the OSC’s office and the cloud environment. Designated users have direct access to the enclave when in the office. When working remotely, those users must establish a VPN connection between their company laptop and the cloud server.

During the assessment, the CCA asks the IT manager about external connections.

How many external connections are within the boundary for this assessment?

Options:

A.

The system has one external connection through the VPN when working outside the office.

B.

The system has no external connections since the OSC operates the connections and the enclave.

C.

The system has one external connection through the dedicated VPN between the office and the Cloud.

D.

The system has two external connections: one through the user-initiated VPNs and one to the company’s office.

Buy Now
Questions 37

When a CCA is assessing a control through Examine, what MUST they meet?

Options:

A.

Documents utilized for review must be in their mailed form

B.

Documents must be policy, process, and procedure documents

C.

Training materials reviewed can be in-process as they are for educational purposes

D.

System-level, network, and data flow diagrams must be completed in draft format

Buy Now
Questions 38

During an assessment, an assessor is trying to determine if the organization provides protection from malicious code at appropriate locations within organizational information systems. The assessor has decided to use the Interview method to gather evidence. It is BEST to interview:

Options:

A.

System developers

B.

System or network administrators

C.

Personnel with audit and accountability responsibilities

D.

Personnel with security alert and advisory responsibilities

Buy Now
Questions 39

An OSC has two business locations. At each location, the OSC has a wireless guest network to which non-OSC employees are allowed access. The guest network is not password protected and it connects devices within the local OSC’s LAN. Based on this information, does the OSC meet the requirements of Level 2 for network access restriction?

Options:

A.

No, the OSC needs to go through an additional assessment.

B.

No, the OSC has not met the network access restriction requirements.

C.

Yes, there are no network access restriction requirements.

D.

Yes, the OSC has met the network access restriction requirements.

Buy Now
Questions 40

An OSC has a headquarters (HQ) site and satellite offices A and B. The two satellite offices are connected to the HQ through a VPN. CUI is stored within the HQ LAN room and used by staff at HQ and Site A. When categorizing assets for this assessment, assets at the HQ:

Options:

A.

and Site A contain CUI assets and Site B is out of scope.

B.

and Site A and Site B contain CUI assets since all have access to CUI.

C.

contain CUI assets and Site A and Site B contain only Certification in Risk Management Assurance.

D.

and Site A contain CUI assets and Site B contains only Certification in Risk Assurance.

Buy Now
Questions 41

The Lead Assessor has conducted an assessment for an OSC. The OSC’s practices have been scored and preliminary results validated. Based on this information, what is the NEXT logical step?

Options:

A.

Determine CMMC Assessment scope.

B.

Deliver recommended assessment results.

C.

Consider additional evidence and record gaps.

D.

Create, finalize, and record recommended final findings.

Buy Now
Questions 42

An OSC leases several servers and rack space in a FedRAMP MODERATE authorized colocation data center. Additional servers operate in a LAN room within the company’s facility. Both facilities are within the OSC’s assessment boundary. In order to assess the physical protection of the environment, the Assessor MUST physically examine the visitor and access controls in place in the:

Options:

A.

Data center

B.

OSC’s facility

C.

OSC’s facility and the data center

D.

OSC’s facility and the data center’s customer relationship management regarding physical security

Buy Now
Questions 43

A company receives data that they suspect is CUI, but it is not marked as such. What is an acceptable way for the company to handle unmarked potential CUI?

Options:

A.

Treat all data as CUI even if not marked.

B.

If data are not marked, then they are not CUI.

C.

Have a procedure for deleting unlabeled data.

D.

Have a procedure for proper handling of unlabeled data.

Buy Now
Questions 44

An OSC seeking Level 2 certification is reviewing the physical security of their building. Currently, the building manager unlocks and locks the doors for business operations. The OSC would like the ability to automatically unlock the door for authorized personnel, track access individually, and maintain access history for all personnel. The BEST approach is for the OSC to:

Options:

A.

Maintain a list of authorized personnel and assign them a building key.

B.

Maintain security cameras to continuously monitor access to the building.

C.

Install a badge system and require each individual to use their badge to gain entry to the building.

D.

Install a keypad system and require the entry code to be changed when an individual leaves the company.

Buy Now
Questions 45

An OSC has an established password policy. The OSC wants to improve its password protection security by implementing a single change. Which of the following is an acceptable element to add to the OSC’s password policy?

Options:

A.

Require passwords to be changed every 18 months.

B.

Require passwords to be 5 to 7 characters long.

C.

Add the use of salted two-way cryptographic hashes of passwords.

D.

Add the use of salted one-way cryptographic hashes of passwords, where possible.

Buy Now
Exam Code: CMMC-CCA
Exam Name: Certified CMMC Assessor (CCA) Exam
Last Update: Aug 31, 2025
Questions: 150

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now CMMC-CCA testing engine

PDF (Q&A)

$31.5  $104.99
buy now CMMC-CCA pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 31 Aug 2025