Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Certified CMMC Assessor (CCA) Exam Question and Answers

Certified CMMC Assessor (CCA) Exam

Last Update Nov 30, 2025
Total Questions : 150

We are offering FREE CMMC-CCA Cyber AB exam questions. All you do is to just go and sign up. Give your details, prepare CMMC-CCA free exam questions and then go for complete pool of Certified CMMC Assessor (CCA) Exam test questions that will help you more.

CMMC-CCA pdf

CMMC-CCA PDF

$36.75  $104.99
CMMC-CCA Engine

CMMC-CCA Testing Engine

$43.75  $124.99
CMMC-CCA PDF + Engine

CMMC-CCA PDF + Testing Engine

$57.75  $164.99
Questions 1

What should the Lead Assessor do to BEST ensure the evidence supplied effectively meets the intent of the standard for a practice?

Options:

A.  

Ensure the evidence for each objective under a practice is adequate.

B.  

Ensure the evidence is sufficient to meet the requirements for a practice.

C.  

Ensure the evidence is complete, validated, and can be mapped to the practice requirements.

D.  

Ensure the evidence covers all the scope and the identified organizations and corresponds to the practice and objectives.

Discussion 0
Questions 2

During a CMMC Level 2 Assessment, a CCA interviewed a system administrator on the OSC’s procedures around configuration management and endpoint security. The system administrator described how they build and deploy new systems, and noted that some users require specialized applications for their jobs. Users have been asked to email IT when they install and run an additional application so IT can add it to their list of allowed software.

What must the CCA conclude?

Options:

A.  

The OSC has properly implemented application deny listing.

B.  

The OSC has not properly implemented application allow listing.

C.  

IT must deploy an application to report newly installed software.

D.  

IT does not have a policy that users notify IT when they install new applications.

Discussion 0
Questions 3

A Lead Assessor is conducting an assessment for an OSC. The OSC is currently using doors and badge access to limit access to private areas of their campus to only authorized personnel. Which item is another means of controlling physical access to areas that contain CUI?

Options:

A.  

Guards

B.  

Cameras

C.  

Firewalls

D.  

Partition walls

Discussion 0
Questions 4

The assessment team is discussing the pre-assessment scope with an OSC. The OSC would like to limit the scope of the security requirements in environments that contain FCI and/or CUI. In this case, the OSC should:

Options:

A.  

Request a single CMMC certification for both activities

B.  

Choose to conduct two separate CMMC certification activities

C.  

Define an Assessment Scope for those assets that process, store, or transmit FCI

D.  

Define a CMMC Self-Assessment Scope for only those assets that process, store, or transmit CUI

Discussion 0
Questions 5

An OSC has an established password policy. The OSC wants to improve its password protection security by implementing a single change. Which of the following is an acceptable element to add to the OSC’s password policy?

Options:

A.  

Require passwords to be changed every 18 months.

B.  

Require passwords to be 5 to 7 characters long.

C.  

Add the use of salted two-way cryptographic hashes of passwords.

D.  

Add the use of salted one-way cryptographic hashes of passwords, where possible.

Discussion 0
Questions 6

An Assessor is evaluating whether an OSC has implemented adequate controls to meet AC.L2-3.1.7: Privileged Functions. The OSC has procedures that define privileged vs. non-privileged account provisioning and an access control policy that restricts execution of certain functions only to privileged users.

What might the Assessor do to further evaluate the implementation of this practice?

Options:

A.  

Examine system logs to verify automatic updates are being applied.

B.  

Test whether the application of a patch is captured in system logging.

C.  

Test whether a non-privileged user can log into a system where CUI is stored.

D.  

Examine a user access list for users that are authorized to access a key management system.

Discussion 0
Questions 7

The OSC has changed its manner of operations in the past year to isolate its manufacturing division (which handles CUI) from its managerial team (which does not). Upon review of the provided information, the Lead Assessor was unable to identify this isolation in the environment. Which step should the Assessor take NEXT to understand how the current documentation isolates the operational components?

Options:

A.  

Review the network or topology diagrams

B.  

Review the change tickets and inventory updates

C.  

Review the SSP

D.  

Review to confirm the baseline configurations exist

Discussion 0
Questions 8

A company mirrors its FCI/CUI data storage in a cloud environment. Data is managed across multiple virtual machines (VMs). To satisfy requirements for data security of the LOCAL copy using physical controls, what should the OSC do?

Options:

A.  

Use encrypted transport and storage of FCI/CUI data on the VMs.

B.  

Store FCI/CUI data without encryption for faster access/backup/restore.

C.  

Ensure that the VMs are running on hardware that is physically located in a controlled-access facility.

D.  

In addition to a password or personal identification number, use physical means to log in such as a smart card or hard token.

Discussion 0
Questions 9

An Assessment Team is holding a discussion with the system administrator at the OSC to understand their process for ensuring unauthorized users are not able to access CUI.

Which assessment method is being utilized?

Options:

A.  

Test method

B.  

Observe method

C.  

Examine method

D.  

Interview method

Discussion 0
Questions 10

An OSC creates standard user accounts with limited capabilities and administrator accounts with full system access. A standard user initiates the uninstall of the anti-virus software, which is organizationally defined as a privileged function. Which of the following would indicate AC.L2-3.1.7: Privileged Functions is properly implemented?

Options:

A.  

The antivirus software is not uninstalled.

B.  

The antivirus software is successfully uninstalled.

C.  

The antivirus software is not uninstalled, and the attempt is captured in an application audit log.

D.  

The antivirus software is successfully uninstalled, and the event is captured in an application audit log.

Discussion 0
Questions 11

While scoping the assessment, the assessor learns that the OSC uses various cloud-based solutions sporadically as part of its normal course of business. The OSC states that most business is conducted on-premises and that only a small amount of business uses the cloud. The OSC thinks the cloud is only used for system backups, but there are isolated exceptions.

Are the data provided sufficient to determine that the OSC limits connection to external information systems?

Options:

A.  

No, the OSC stated most of its business is on-premises.

B.  

No, the OSC did not fully define the extent external connections are used.

C.  

Yes, the OSC confirmed that external connections occur.

D.  

Yes, the OSC confirmed that external connections occur for system backups.

Discussion 0
Questions 12

An OSC seeking Level 2 certification has recently configured system auditing capabilities for all systems within the assessment scope. The audit logs are generated based on the required events and contain the correct content that the organization has defined.

Which of the following BEST describes the next system auditing objective that the organization should define?

Options:

A.  

Centralized audit log collection

B.  

Integration of all system audit logs

C.  

Review and update of logged events

D.  

Retention requirements for audit records

Discussion 0
Questions 13

An assessor is reviewing whether an organization appropriately analyzed the security impact of a new release of an application. Which of the following documents is MOST useful for the assessor to review?

Options:

A.  

A description of the change from the software vendor

B.  

Change Control Board (CCB) meeting minutes and supporting documents

C.  

System audit logs showing that the change occurred, when, and by whom

D.  

A log of security incidents/issues after the change was implemented

Discussion 0
Questions 14

While onsite conducting a CMMC Level 2 assessment at a small architecture firm that handles DoD construction contracts, the client offers a list of personnel for interviews. To answer questions regarding visitor access controls, which personnel would be MOST appropriate for interviewing?

Options:

A.  

System Administrator

B.  

Front-desk Receptionist

C.  

Administrative Assistant

D.  

Senior Architecture Partner

Discussion 0
Questions 15

During an assessment, the OSC person being interviewed explains the process for escorting visitors. The individual states that while all visitors are escorted, occasionally a vendor may need access to a small room with only one door and limited standing room. In these cases, the escort sits outside the room and observes the vendor completing the work. Is this practice in line with the escort policy?

Options:

A.  

No, the escort is not allowed to sit down

B.  

No, the escort must always be in the same room

C.  

Yes, since the visitor can only use a single entry

D.  

Yes, so long as the visitor’s actions can still be viewed by the escort

Discussion 0
Questions 16

During the Planning Phase of the Assessment Plan, the assessor determines that the Client will likely include sensitive and proprietary CUI. What should the assessor consider as part of their virtual data collection techniques for this information?

Options:

A.  

The Client is responsible for safeguarding the data during collection, not the assessor.

B.  

The assessor is responsible for safeguarding the data during collection, not the client.

C.  

The assessor should record the risks and mitigations to protect the CUI categories handled.

D.  

The client and assessor should record the risks and mitigations to protect the CUI categories handled.

Discussion 0
Questions 17

While conducting a CMMC Level 2 assessment at a 100-person manufacturing company, the assessor receives a yellow badge labeled “SPECIAL ACCESS.” The assessor observes multiple badge types used by staff and visitors. The client explains that only three badge colors correspond to controlled access (with electronic access), while the rest are identifiers for seniority. How can the assessor BEST verify that the three colors are the only badges capable of accessing controlled areas for CUI-related activities?

Options:

A.  

Interviewing CUI-cleared staff

B.  

Reviewing standard operating procedures for badge issuance

C.  

Reviewing retained electronic badge entry logs or audits thereof

D.  

Borrowing a badge from another staff member and attempting to enter a controlled space

Discussion 0
Questions 18

A cloud-native OSC uses a vendor’s FedRAMP MODERATE authorized cloud environment for all aspects of their CUI needs (identity, email, file storage, office suite, etc.) as well as the vendor’s locally installable applications. The OSC properly configured the vendor’s cloud-based SIEM system to monitor all aspects of the cloud environment. The OSC’s SSP documents SI.L2-3.14.7: Identify Unauthorized Use, defining authorized use and referencing procedures for identifying unauthorized use.

How should the Certified Assessor score this practice?

Options:

A.  

NOT MET because logs from physical infrastructure are not captured by the SIEM.

B.  

NOT MET because locally installable applications from a cloud-native environment are not allowed.

C.  

MET because being cloud-native is a great way to contain risk to a vendor’s environment.

D.  

MET because the cloud SIEM is configured to monitor all of the vendor’s cloud environment.

Discussion 0
Questions 19

An OSC seeking Level 2 certification is migrating to a fully cloud-based environment. The organization wants to select a Cloud Service Provider (CSP) that can share responsibilities for CMMC Level 2 requirements. Assume both CSPs can equally provide the technical capabilities and business value required.

    CSP A has SOC 2 certification and is California Consumer Privacy Act (CCPA) and Health Insurance Portability and Accountability Act (HIPAA) compliant.

    CSP B has SOC 2 and FedRAMP Moderate certifications.

Based on this information, which CSP is MOST LIKELY to be acceptable?

Options:

A.  

CSP A

B.  

CSP B

C.  

Both CSP A and B

D.  

Neither CSP A nor B

Discussion 0
Questions 20

While conducting a CMMC Level 2 Third-Party Assessment of a small defense contractor, an assessor discovers that the contractor’s Information Security Policy has no documented change records demonstrating executive approval. The IT director states that they will add change records in the future, but that other evidence exists. Which documentation is MOST able to demonstrate persistent and habitual adherence to CMMC requirements?

Options:

A.  

Handwritten notes from executive committee meetings discussing implementation

B.  

Several years’ worth of saved emails from the executive team approving policies and directing adherence

C.  

A notarized letter from the previous CEO stating that they approved information security policies annually

D.  

Transcribed interviews with new employees discussing their understanding of information security policies

Discussion 0
Questions 21

An OSC is preparing for an assessment and wants to gather evidence that will be used by the Lead Assessor to determine the scope of the assessment. The OSC currently operates a hybrid network, with part of their infrastructure at their physical location and part of their infrastructure in a cloud environment.

What evidence should the OSC collect that would assist the Lead Assessor in determining cloud and hybrid environment constraints?

Options:

A.  

Subnetworks list

B.  

System inventory

C.  

Company-owned hardware list

D.  

Cloud Service Provider’s Customer Responsibility Matrix

Discussion 0
Questions 22

During a CMMC Assessment, the assessor is determining if the Escort Visitors practice is MET. Personnel with which of the following responsibilities would be MOST appropriate to interview?

Options:

A.  

Repair and facilities maintenance

B.  

Local access control and information security

C.  

Physical access control and information security

D.  

Information technology management and operations

Discussion 0
Questions 23

The OSC has assembled its documentation relating to how it controls remote access for assessment. The Lead Assessor compared this documentation to the provided topology map and noted several indications of external connections with External Service Providers (ESPs). Which document is MOST LIKELY to show acceptable evidence of the security controls related to the interface between the OSC and the ESP?

Options:

A.  

OSC’s access control policy

B.  

Interconnection agreement with ESPs

C.  

Technical design of the security of the available VPN

D.  

Instructions provided to the OSC from the ESP to implement remote access

Discussion 0
Questions 24

An OSC has a minimal physical footprint consisting only of network equipment, workstations, and a centralized domain environment. File storage is centralized in a third-party vendor’s FedRAMP Moderate authorized cloud environment, and employees access files using the cloud integration with their workstations. Since CUI is stored in the FedRAMP Moderate authorized environment, the OSC should prepare to have which environment(s) assessed?

Options:

A.  

Cloud environment only

B.  

OSC’s physical network only

C.  

Cloud environment and the OSC’s physical network

D.  

OSC’s physical network, the cloud environment, and the cloud vendor’s employee network

Discussion 0
Questions 25

While conducting a CMMC Level 2 gap analysis with a large defense contractor, a CMMC RP confirms that the organization uses a RADIUS server for authentication. What additional method could be used to comply with AC.L2-3.1.17: Wireless Access Protection?

Options:

A.  

Layer 3 switch

B.  

Intrusion detection solution

C.  

WPA2-Enterprise encryption

D.  

Frequency-hopping wireless access

Discussion 0
Questions 26

The OSC POC has supplied all of the procedures, policies, and plans at the start of the assessment. One of the assessors notes that some of the documents have very recent approval dates, while others have been in place for several years based on the document history.

In order to ensure the review of this evidence is sufficient, what is the BEST step to validate the sufficiency of these documents?

Options:

A.  

Examine the documents to determine if they are complete.

B.  

Examine if the procedure in question replaced another document.

C.  

Interview OSC team members who should be using the procedure.

D.  

Interview people who hold leadership roles named in the documents.

Discussion 0
Questions 27

An OSC has a large multi-building facility. One building is used as the OSC’s data center. A guard is stationed at the entrance to the data center. A vendor engineer comes onsite to perform maintenance on the storage array in the data center. The guard knows the engineer well and has the engineer fill out the visitor log with the contact person’s name and phone number, the reason for the visit, and the date and time. Since the guard has known the engineer for many years, what is the BEST step the guard should take?

Options:

A.  

Call the contact person and let her know that the engineer is onsite and give the engineer a temporary badge to enter the data center.

B.  

Call the operations center to give the engineer temporary access to enter the data center and escort the engineer to the array and leave.

C.  

Call the contact person to have her come down and escort the engineer to the array and stay with the engineer until the maintenance is complete.

D.  

Call the operations center to have one of the admins escort the engineer to the array and stay with the engineer until the maintenance is complete.

Discussion 0
Questions 28

When a CCA is assessing a control through Examine, what MUST they meet?

Options:

A.  

Documents utilized for review must be in their mailed form

B.  

Documents must be policy, process, and procedure documents

C.  

Training materials reviewed can be in-process as they are for educational purposes

D.  

System-level, network, and data flow diagrams must be completed in draft format

Discussion 0
Questions 29

The team is assessing an OSC that uses the cloud for hosting its online services. Which of the following is NOT important for the assessor to consider?

Options:

A.  

Devices connecting to the system are authorized.

B.  

Processes acting on behalf of a user are authenticated.

C.  

Users are authorized as a prerequisite to system access.

D.  

FIPS encryption is authenticated as a prerequisite to system access.

Discussion 0
Questions 30

During an assessment, the Assessment Team has identified, according to the SSP and network diagram, that there is a mission system that cannot be altered but that has privileged accounts which should have MFA applied. As it is not possible to deploy a typical type of MFA on the mission system, which of the following constitutes a sufficient second factor?

Options:

A.  

VPN access to the mission system

B.  

User access logs on the mission system

C.  

Badge access to the mission system room

D.  

Remote access logs on the mission system

Discussion 0
Questions 31

An organization’s password policy includes these requirements:

    Passwords must be at least 8 characters in length.

    Passwords must contain at least one uppercase character, one lowercase character, and one numeric digit.

    Passwords must be changed at least every 90 days.

    When a password is changed, none of the previous 3 passwords can be reused.

Per IA.L2-3.5.7: Password Complexity, what requirement is missing from this password policy?

Options:

A.  

It does not require MF

A.  

B.  

It does not include a list of prohibited passwords.

C.  

It does not specify a minimum change of character requirement.

D.  

It does not require the password to contain at least one special character.

Discussion 0
Questions 32

An assessor is assigned by the Lead Assessor to the pre-assessment template regarding evidence. There are several entries that include how the Assessment Team will identify, obtain, and inventory evidence. What else is required to determine readiness to conduct the assessment?

Options:

A.  

Identify the scope of the OSC.

B.  

Delineate what is required to verify the evidence.

C.  

Delineate observations by the Assessment Team.

D.  

Identify additional people to interview to gather more evidence.

Discussion 0
Questions 33

A Lead Assessor is preparing to conduct a Level 2 Assessment for an OSC. The assessor already determined the assessment scope and systems included. In addition, the assessor requests:

    Results of the most recent OSC self-assessment or any pre-assessments by an RPO,

    The System Security Plan (SSP), and

    A list of all OSC staff who play a role in in-scope procedures.

Based on this information, which item would the assessor MOST LIKELY request when preparing to conduct a Level 2 Assessment?

Options:

A.  

A list of objectives

B.  

A manual for each system

C.  

A preliminary list of the anticipated evidence

D.  

A list of assets that are determined to be out-of-scope

Discussion 0
Questions 34

Different mechanisms can be used to protect information at rest. Which mechanism is MOST LIKELY to afford protection for information at rest?

Options:

A.  

Patching

B.  

File share

C.  

Secure offline storage

D.  

Cryptographic mechanisms

Discussion 0
Questions 35

An OSC has contracted a C3PAO to perform a Level 2 Assessment. As the Lead Assessor is analyzing the assessment requirements, it is found that the OSC does not have a document detailing the assessment scope. How can this problem BEST be fixed?

Options:

A.  

The Assessment Team is supposed to generate the document before moving forward.

B.  

The CCA tells the OSC they must provide the document before the assessment can begin.

C.  

The OSC and the Lead Assessor jointly create the document at the beginning of the assessment.

D.  

The Lead Assessor can regulate the assessment and create/adjust the document moving forward.

Discussion 0
Questions 36

During preparations for a CMMC Level 2 Assessment, a client submits a request to their consulting RP to learn more about Specialized Asset requirements. The client is unsure if their camera system, used for safety data collection purposes within their machining shop, should be documented within the SSP. Which reason is a satisfactory reason to exclude the camera system from the SSP, and thus the assessment scope?

Options:

A.  

The video data are deleted every seven days.

B.  

The Technology Control Plan does not address the camera system.

C.  

The camera data are uploaded to a FedRAMP MODERATE authorized cloud storage system.

D.  

The camera system network is physically and logically isolated and does not capture data related to controlled projects.

Discussion 0
Questions 37

AC.L2-3.1.6: Non-Privileged Account Use is being assessed. Which procedure BEST meets all of the standards for non-privileged account use?

Options:

A.  

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for security tasks.

B.  

All employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their non-privileged account for security tasks.

C.  

All non-IT employees are given a non-privileged user account.

System Administrators are given a separate administrator account.

System Administrators use their administrator account for all tasks.

D.  

All non-IT employees are given a non-privileged user account.

System Administrators are given only an administrator account.

System Administrators use their administrator account for all tasks.

Discussion 0
Questions 38

The Lead Assessor concludes that the OSC is not ready for the assessment. After the Readiness Assessment Review, the OSC and the Lead Assessor could choose to:

Options:

A.  

Replan or cancel the assessment.

B.  

Replan or reschedule the assessment.

C.  

Proceed as planned or cancel the assessment.

D.  

Proceed as planned or reschedule the assessment.

Discussion 0
Questions 39

In order to assess whether an OSC meets AC.L2-3.1.5: Least Privilege, what should be examined by the Assessor?

Options:

A.  

Authentication policy

B.  

System configurations for all systems

C.  

User access lists that identify privileged users

D.  

List of terminated employees over the last three months

Discussion 0
Questions 40

An Assessor is evaluating controls put in place by an OSC to restrict the use of privileged accounts. The Assessor interviews privileged users and confirms that the OSC has both a policy and specific procedures governing the use of privileged accounts for security functions. What else could the Assessor evaluate to validate the assertions made by the interviewed OSC staff?

Options:

A.  

Examine the system architecture of the OSC to identify privileged accounts

B.  

Test the processes for non-privileged accounts to perform privileged functions

C.  

Examine the procedure assigning privileged roles to non-privileged functions

D.  

Test the processes for privileged accounts with privileged users

Discussion 0
Questions 41

While assessing a company, the CCA is determining whether the company controls and manages connections between its corporate network and all external networks. The company has: (1) a strict employee policy prohibiting personal Internet use and personal email on company computers, and (2) firewalls plus a connection allow-list so only authorized external networks can connect to the company network. Are these safeguards sufficient to meet the applicable CMMC requirement?

Options:

A.  

Yes. The company’s strict employee policy is the best practice for meeting the requirement.

B.  

No. The company must isolate its system from all external connections to meet the requirement.

C.  

Yes. The company’s firewalls and connection allow-lists are appropriate technical controls to meet the requirement.

D.  

No. The company needs full control over all external systems it interfaces with to meet the requirement.

Discussion 0
Questions 42

An OSC has a headquarters (HQ) site and satellite offices A and B. The two satellite offices are connected to the HQ through a VPN. CUI is stored within the HQ LAN room and used by staff at HQ and Site A. When categorizing assets for this assessment, assets at the HQ:

Options:

A.  

and Site A contain CUI assets and Site B is out of scope.

B.  

and Site A and Site B contain CUI assets since all have access to CUI.

C.  

contain CUI assets and Site A and Site B contain only Certification in Risk Management Assurance.

D.  

and Site A contain CUI assets and Site B contains only Certification in Risk Assurance.

Discussion 0
Questions 43

During an assessment, the team is interviewing the IT staff to understand the ways in which the organization protects backup data. Because the company’s backups contain CUI, the Lead Assessor asks the IT engineer which method is used to ensure that the confidentiality of the backup data is being protected. Which implementation is LEAST LIKELY to be acceptable?

Options:

A.  

Alternative physical controls for site access

B.  

Managing who has access to the information

C.  

Physically securing devices and media that contain CUI

D.  

Encrypting files or media using industry-standard encryption

Discussion 0
Questions 44

An OSC is presenting evidence of its fulfillment of CM.L2-3.4.1: System Baselining. It provides:

    System inventory records showing additions/removals of machines,

    Software inventory showing installations/removals, and

    A system component installation plan with software needs and user specifications.

What other documentation MUST the company present to illustrate compliance with CM.L2-3.4.1?

Options:

A.  

Documentation of the physical safeguards protecting the “gold” baseline images

B.  

Documentation of a formal baseline review integrated with a system development lifecycle

C.  

Documentation of any authorized deviations from the system baselines for end-user computers

D.  

Documentation of a formal chain of custody for new hardware on which baselines will be installed

Discussion 0
Questions 45

While completing the Level 2 Assessment, the Lead Assessor found that the OSC was deficient on a number of CMMC practices. Forty practices were scored as NOT MET, all on the Authorized Deficiency Corrections list. The OSC remediated 17 of those during closeout, leaving 23 practices still NOT MET. What should the Lead Assessor recommend?

Options:

A.  

Pass the OSC but put the 23 remaining on a POA&M

B.  

Fail the OSC and require them to remediate and reapply for Level 2 certification

C.  

Recommend an interim certification and put the 23 remaining practices on a POA&M

D.  

Recommend an interim certification and revisit the failed practices upon certification renewal

Discussion 0