CMMC-CCA Exam Question 86

As the Lead Assessor, you determine that some details, like wireless entry points, are not included in the assessment scope. However, the OSC Assessment Official claims that this is covered in the network enclave.
Examining their enclave architecture, you determine it is not covered, but the OSC Assessment Official insists. What should you do?
  • CMMC-CCA Exam Question 87

    A CCA is reviewing an OSC's evidence for a CMMC practice and finds that the documentation is in draft form, marked "For Internal Use Only," and lacks final approval. The OSC insists it is actively used. How should the CCA evaluate this evidence?
  • CMMC-CCA Exam Question 88

    An OSC allows some employees to use their personal devices (laptops, tablets) for work purposes. The OSC enforces a Bring Your Own Device (BYOD) policy that requires employees to install Mobile Device Management (MDM) software on their devices. The MDM allows for remotewiping of lost or stolen devices and enforces access control policies. Employees use VPNs to remotely access the OSC network from their personal devices. What challenges might a CCA face when collecting evidence to assess the OSC's compliance with AC.L2-3.1.12 - Control Remote Access?
  • CMMC-CCA Exam Question 89

    When assessing a contractor's implementation of CMMC practices, you examine its System Security Plan (SSP) to identify its documented measures for audit reduction and reporting. They have a dedicated section in their SSP addressing the Audit and Accountability requirements. You proceed to interview their information security personnel, who informed you that the contractor has a dedicated Security Operations Center (SOC) and uses Splunk to reduce and report audit logs. What key features regarding the deployment of Splunk for AU.L2-3.3.6 - Reduction & Reporting would you be interested in assessing?
  • CMMC-CCA Exam Question 90

    To transfer CUI between a government client and its internal systems, a defense contractor uses a Secure File- Sharing Application provided by the DoD. However, all data traversing this boundary must pass through a next-generation firewall (NGFW) managed by the contractor's Network Admin. All CUI is stored on a Solid State Drive (SSD) and accessed through a laptop. What type of asset is the Secure File-Sharing Application?