We at Crack4sure are committed to giving students who are preparing for the Cyber AB CMMC-CCP Exam the most current and reliable questions . To help people study, we've made some of our Certified CMMC Professional (CCP) Exam exam materials available for free to everyone. You can take the Free CMMC-CCP Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.
The Level 1 practice description in CMMC is Foundational. What is the Level 2 practice description?
Expert
Advanced
Optimizing
Continuously Improved
Understanding CMMC 2.0 Levels and Their Descriptions
TheCybersecurity Maturity Model Certification (CMMC) 2.0consists ofthree levels, each representing increasing cybersecurity maturity:
Level 1 – Foundational
Focuses onbasic cyber hygiene
Implements17 practicesaligned withFAR 52.204-21
Primarily protectsFederal Contract Information (FCI)
Level 2 – Advanced(Correct Answer)
Focuses onprotecting Controlled Unclassified Information (CUI)
Implements110 practicesaligned withNIST SP 800-171
Requirestriennial third-party assessments for critical programs
Level 3 – Expert
Focuses onadvanced cybersecurityagainstAPT (Advanced Persistent Threats)
ImplementsNIST SP 800-171 and additional NIST SP 800-172 controls
Requirestriennial government-led assessments
Why "B. Advanced" is Correct?
TheCMMC 2.0 framework explicitly describes Level 2 as "Advanced."
Italigns with NIST SP 800-171to ensure robustCUI protection.
Why Other Answers Are Incorrect?
A. Expert (Incorrect)– This describesLevel 3, not Level 2.
C. Optimizing (Incorrect)– Not a defined CMMC level description.
D. Continuously Improved (Incorrect)– CMMC does not use this terminology.
Conclusion
The correct answer isB. Advanced, which accurately describesCMMC Level 2.
Which term describes the prevention of damage to. protection of, and restoration of computers and electronic communications systems/services, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation?
Cybersecurity
Data security
Network security
Information security
The term that describes"the prevention of damage to, protection of, and restoration of computers and electronic communication systems/services, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation"isCybersecurity.
Step-by-Step Breakdown:
?1. Cybersecurity Defined
Cybersecurityfocuses onprotecting networks, systems, and datafrom cyber threats.
It includes measures to ensure:
Availability(data is accessible when needed).
Integrity(data is accurate and unaltered).
Authentication(verifying users' identities).
Confidentiality(ensuring only authorized access).
Non-repudiation(preventing denial of actions).
The definition in the questionaligns directly with cybersecurity principles, making it the best answer.
?2. Why the Other Answer Choices Are Incorrect:
(B) Data Security?
Data securityfocusesspecificallyon protectingstored information(e.g., encryption, access controls), but cybersecurity is broader—it includesnetworks, systems, and communication services.
(C) Network Security?
Network securityis asubset of cybersecuritythat focuses on protectingnetwork infrastructure(e.g., firewalls, intrusion detection systems).
The definition in the question includesmore than just networks, so cybersecurity is the better choice.
(D) Information Security?
Information security (InfoSec)is related but broader than cybersecurity.
InfoSeccoversphysical and organizational security(e.g., policies, procedures) in addition todigital protections.
Final Validation from CMMC Documentation:
CMMC and NIST SP 800-171 define cybersecurityas the protection ofsystems, networks, and data from cyber threats.
DoD Cybersecurity Definitions(aligned with NIST) confirm that cybersecurity is the term thatbest fits the definition in the question.
Who will verify the adequacy and sufficiency of evidence to determine whether the practices and related components for each in-scope Host Unit. Supporting Organization/Unit, or enclave has been met?
OSC
Assessment Team
Authorizing official
Assessment official
Who Verifies the Adequacy and Sufficiency of Evidence?
In the CMMC assessment process, it is theAssessment Teamthat is responsible for verifying whether thepractices and related componentshave been met for each in-scopeHost Unit, Supporting Organization/Unit, or enclave.
TheCMMC Assessment Teamis composed of certified assessors and led by aCertified CMMC Assessor (CCA). Their primary role is to:
Review evidenceprovided by theOrganization Seeking Certification (OSC).
Determine compliancewith required CMMC practices and processes.
Evaluate the sufficiencyof evidence to confirm that all required practices have been properly implemented.
Document and report findingsto the CMMC Accreditation Body (CMMC-AB).
Breakdown of Answer Choices
Option
Description
Correct?
A. OSC (Organization Seeking Certification)
The OSC provides documentation and evidence but doesnotverify its adequacy.
?Incorrect
B. Assessment Team
?Responsible for verifying the adequacy and sufficiency of evidence.
?Correct
C. Authorizing Official
Typically refers to an official responsible for system accreditation underNIST RMF, not CMMC.
?Incorrect
D. Assessment Official
Not a defined role in the CMMC framework.
?Incorrect
Official Reference from CMMC 2.0 Documentation
TheCMMC Assessment Process Guide(CAP) outlines theAssessment Team'sresponsibility in verifying evidence.
TheCMMC Assessment Teamevaluates whether theorganization's cybersecurity practices meet CMMC requirements.
Final Verification and Conclusion
The correct answer isB. Assessment Team, as per CMMC 2.0 documentation and official assessment processes.
Validation of findings is an iterative process usually performed during the Daily Checkpoints throughout the entire assessment process. As a validation activity, why are the preliminary findings important?
It allows the OSC to comment and provide additional evidence.
It determines whether the OSC will be rated MET or NOT MET on their assessment.
It confirms that the Assessment Team's findings are right and cannot be changed.
It corroborates the Assessment Team's understanding of the CMMC practices and controls.
1. Understanding the Validation of Findings in CMMC Assessments
Validation of findings is an essential part of theCMMC assessment process, ensuring that observations and preliminary conclusions drawn by the assessment team are accurate, fair, and based on complete evidence. This process occurs iteratively during theDaily Checkpointsand is fundamental in determining the overall compliance status of theOrganization Seeking Certification (OSC).
2. The Role of Preliminary Findings in the Assessment Process
Preliminary findings arenot finalbut rather a mechanism for ensuring transparency, accuracy, and fairness. These findings serve several key purposes:
Allows for OSC Input & Clarification: The OSC has an opportunity to review andprovide additional evidencethat may address deficiencies identified by the assessment team.
Prevents Misinterpretations: By allowing the OSC to comment, the assessment team can refine or correct their understanding of the OSC's implementation of CMMC practices.
Supports Fair and Informed Ratings: Before finalizing MET or NOT MET determinations, the assessment team ensures they have considered all relevant evidence.
Encourages a Collaborative Assessment Process: This validation activity fosters open communication between assessors and the OSC, reducing disputes and misunderstandings.
3. Why Answer Choice "A" is Correct
The primary purpose of preliminary findings is to allow theOSC to comment and provide additional evidencebefore final determinations are made.
This aligns withCMMC Assessment Process guidance, which emphasizes iterative validation of findings throughDaily Checkpoints and Final Outbriefdiscussions.
The validation of findings ensures thatOSC responses and supplementary evidence are considered, making the assessment process more accurate and fair.
4. Why Other Answer Choices Are Incorrect
Option
Reason for Elimination
B. It determines whether the OSC will be rated MET or NOT MET on their assessment.
Incorrect: Preliminary findings do not directly determine the final rating. The assessment team reviews all collected evidence before making a final decision.
C. It confirms that the Assessment Team's findings are right and cannot be changed.
Incorrect: Findings arenot finalat the preliminary stage. The OSC has the opportunity to challenge findings by providing new or clarifying evidence.
D. It corroborates the Assessment Team's understanding of the CMMC practices and controls.
Partially Correct but Not the Best Answer: While validation helps refine understanding, itsprimary function is to allow OSC input, making optionA the most accurate choice.
5. Official CMMC References Supporting This Answer
CMMC Assessment Process (CAP) Document:
Section 5.3 – Validation of Findings: "The OSC is given the opportunity to provide additional evidence and comments to clarify or supplement preliminary assessment results."
Section 5.4 – Daily Checkpoints: "The assessment team discusses preliminary findings with the OSC, allowing the organization to address concerns in real time."
CMMC 2.0 Level 2 Scoping & Assessment Guide:
Confirms that the assessment process includes continuous dialogue with the OSC before final determinations are made.
6. Conclusion
Preliminary findings are acrucial validation stepin CMMC assessments, ensuring that organizations have the opportunity toprovide additional evidence and clarify potential misunderstandings. This iterative process improves accuracy and fairness in determining compliance with CMMC requirements. Therefore, the correct answer is:
A. It allows the OSC to comment and provide additional evidence.
The Lead Assessor interviews a network security specialist of an OSC. The incident monitoring report for the month shows that no security incidents were reported from OSC's external SOC service provider. This is provided as evidence for RA.L2-3.11.2: Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified. Based on this information, the Lead Assessor should conclude that the evidence is:
inadequate because it is irrelevant to the practice.
adequate because it fits well for expected artifacts.
adequate because no security incidents were reported.
inadequate because the OSC's service provider should be interviewed.
Understanding RA.L2-3.11.2: Vulnerability Scanning
TheRA.L2-3.11.2practice requires organizations to:
?Regularly scan for vulnerabilitiesin systems and applications.
?Perform scans when new vulnerabilities are identified.
?Use vulnerability scanning tools or servicesto proactively detect security weaknesses.
Why Is an Incident Monitoring Report Irrelevant?
Anincident monitoring reporttrackssecurity incidents, notvulnerability scanning activities.
Vulnerability scanning reportsshould include:
?A list of vulnerabilities detected.
?Remediation actions taken.
?Scan frequency and schedule.
Theabsence of reported security incidentsdoesnotconfirm that vulnerability scans were performed.
Why is the Correct Answer "A. Inadequate because it is irrelevant to the practice"?
A. Inadequate because it is irrelevant to the practice ? Correct
Alack of reported security incidents does not confirm that vulnerability scanning was performed.
B. Adequate because it fits well for expected artifacts ? Incorrect
Incident monitoring reportsare not expected artifactsfor this control.Vulnerability scan reportsare required instead.
C. Adequate because no security incidents were reported ? Incorrect
The absence of incidents does not mean the OSC is performing vulnerability scanning. This isnot valid evidence.
D. Inadequate because the OSC's service provider should be interviewed ? Incorrect
While interviewing the provider may be useful, themain issue is that the provided evidence is irrelevant. Thecorrect evidence (vulnerability scan reports) is missing.
CMMC 2.0 References Supporting This Answer:
NIST SP 800-171 (Requirement 3.11.2 – Vulnerability Scanning)
Defines the requirement toscan for vulnerabilities periodically and when new threats emerge.
CMMC Assessment Guide for Level 2
Specifies that evidence for RA.L2-3.11.2 should includevulnerability scan reports, not incident monitoring reports.
CMMC 2.0 Model Overview
Confirms that organizationsmust proactively identify vulnerabilities through scanning, not just rely on incident detection.
Which domain references the requirements needed to handle physical or digital assets containing CUI?
Media Protection (MP)
Physical Protection (PE)
System and Information Integrity (SI)
System and Communications Protection (SC)
Understanding the Media Protection (MP) Domain
TheMedia Protection (MP) domaininCMMC 2.0focuses on the security requirements needed to handlephysical or digital mediacontainingControlled Unclassified Information (CUI).
This domain includes controls for:
Protecting digital and physical mediathat store CUI.
Sanitizing and destroying mediabefore disposal or reuse.
Restricting access to CUI mediato authorized personnel only.
Why the Correct Answer is "A. Media Protection (MP)"?
TheMP domaindirectly addresses the requirements for handlingCUI media, includingencryption, access control, storage, and disposal.
CMMC 2.0Level 2aligns withNIST SP 800-171, which includesMP controlsfor managing media containing CUI.
Why Not the Other Options?
B. Physical Protection (PE)?Incorrect
PEfocuses onphysical security(e.g., facility access, visitor logs, physical barriers),not the handling of CUI on media.
C. System and Information Integrity (SI)?Incorrect
SIdeals withsystem monitoring, vulnerability management, and incident response, not media protection.
D. System and Communications Protection (SC)?Incorrect
SCcoversnetwork security, encryption, and secure communications, but does not specifically focus on media handling.
Relevant CMMC 2.0 References:
CMMC Level 2 Practice MP.3.125– Protects CUI by ensuring proper handling ofmedia containing CUI.
NIST SP 800-171 (MP Family)– Establishes security requirements for handlingdigital and physical mediacontaining CUI.
CMMC Scoping Guide (Nov 2021)– ConfirmsMP controls apply to all media that store, process, or transmit CUI.
Final Justification:
SinceMedia Protection (MP) directly addresses the handling of assets containing CUI, the correct answer isA. Media Protection (MP).
Which CMMC Levels focus on protecting CUI from exfiltration?
Levels 1 and 2
Levels 1 and 3
Levels 2 and 3
Levels 1, 2, and 3
Level 1 only addresses the protection of Federal Contract Information (FCI) and does not include requirements for safeguarding Controlled Unclassified Information (CUI).
Level 2 is explicitly designed to protect Controlled Unclassified Information (CUI). It requires implementation of all 110 security requirements from NIST SP 800-171 Rev. 2, which directly support the safeguarding of CUI and help prevent its unauthorized disclosure or exfiltration.
Level 3 builds on Level 2 by including a subset of requirements from NIST SP 800-172. These additional practices are designed to enhance the protection of CUI against advanced persistent threats (APTs), further strengthening defenses against exfiltration.
Therefore, the levels that focus on protecting CUI from exfiltration are Levels 2 and 3.
Reference Documents:
CMMC Model v2.0 Overview (DoD, December 2021)
NIST SP 800-171 Rev. 2,Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
NIST SP 800-172,Enhanced Security Requirements for Protecting Controlled Unclassified Information
When are contractors required to achieve a CMMC certificate at the Level specified in the solicitation?
At the time of award
Upon solicitation submission
Thirty days from the award date
Before the due date of submission
PerDFARS 252.204-7021, contractors must achieve the requiredCMMC certification levelbefore contract awardif the solicitation specifies it.
Key Requirements:
?Contractorsmust be certified at the required CMMC levelprior to contract award.
?Thecertification must be conducted by a C3PAO(for Level 2) orthrough self-assessment(for Level 1).
?The certification must bevalid and registered in the Supplier Performance Risk System (SPRS)before award.
Why is the Correct Answer "At the Time of Award" (A)?
A. At the time of award ? Correct
DFARS 252.204-7021requires CMMC certification before a contract can be awardedif the solicitation includes CMMC requirements.
B. Upon solicitation submission ? Incorrect
Contractorsdo notneed to be CMMC-certified at thetime of bid submission, only by the time of award.
C. Thirty days from the award date ? Incorrect
Contractorsmust already be certified before the award is granted. There isno grace period.
D. Before the due date of submission ? Incorrect
While compliance planning is important,CMMC certification is only required before contract award, not before bid submission.
CMMC 2.0 References Supporting This Answer:
DFARS 252.204-7021 (CMMC Requirement Clause)
CMMC certification is required prior to contract awardif specified in the solicitation.
CMMC 2.0 Program Overview
States that certificationis not needed at bid submission but is required before award.
DoD Interim Rule & SPRS Guidance
Contractors must havea valid CMMC certification recorded in SPRSbefore award.
A contractor has implemented IA.L2-3.5.3: Multifactor Authentication practice for their privileged users, however, during the assessment it was discovered that the OSC's standard users do not require MFA to access their endpoints and network resources. What would be the BEST finding?
The process is running correctly.
It is out of scope as this is a new acquisition.
The new acquisition is considered Specialized Assets.
Practice is NOT MET since the objective was not implemented.
Understanding IA.L2-3.5.3: Multifactor Authentication (MFA) Requirement
TheIA.L2-3.5.3practice, derived fromNIST SP 800-171 (Requirement 3.5.3), requires thatmultifactor authentication (MFA) be implemented for both privileged and standard userswhen accessing:
?Organizational endpoints(e.g., laptops, desktops, mobile devices).
?Network resources(e.g., VPNs, internal systems).
?Cloud services containing Controlled Unclassified Information (CUI).
Key Requirement for a "MET" Rating
For IA.L2-3.5.3 to beMet, the organization must:
Require MFA for all privileged users(e.g., system administrators).
Require MFA for standard users accessing endpoints and network resources.
Implement MFA across all relevant systems.
Sincestandard users do not require MFA in the OSC’s current implementation, the practiceis not fully implementedand must be ratedNOT MET.
Why is the Correct Answer "D" (Practice is NOT MET since the objective was not implemented)?
A. The process is running correctly ? Incorrect
MFA isonly applied to privileged users, but it isalso required for standard users. The process isnot fully implemented.
B. It is out of scope as this is a new acquisition ? Incorrect
New acquisitionsmust still meet MFA requirementsif they handle CUI or network access.
C. The new acquisition is considered Specialized Assets ? Incorrect
Specialized assets (e.g., IoT, legacy systems) may have alternative security controls, but standard users and endpointsmust still comply with MFA.
D. Practice is NOT MET since the objective was not implemented ? Correct
MFA must be enabled for both privileged and standard usersaccessing endpoints and network resources. Since standard users are excluded, the practice isNOT MET.
CMMC 2.0 References Supporting This Answer:
CMMC 2.0 Level 2 (Advanced) Requirements
Specifies thatMFA must be applied to all users accessing CUI and network resources.
NIST SP 800-171 (Requirement 3.5.3 – MFA Implementation)
Requires MFA forall user types, including privileged and standard users.
CMMC Assessment Process (CAP) Document
States that a practicemust be fully implemented to be considered MET. Partial implementation meansNOT MET.
A C3PAO is conducting High Level Scoping for an OSC that requested an assessment Which term describes the people, processes, and technology that will be applied to the contract who are requesting a CMMC Level assessment?
Host Unit
Branch Office
Coordinating Unit
Supporting Organization/Units
According to the CMMC Assessment Process (CAP), specifically in the context of scoping and organizational structure, the term Host Unit is used to define the specific entity within an Organization Seeking Certification (OSC) that is the primary subject of the assessment.
Definition of Host Unit: Within the CAP, the Host Unit represents the specific people, processes, and technology that process, store, or transmit Controlled Unclassified Information (CUI) or Federal Contract Information (FCI) for the contract in scope. It is the "anchor" for the assessment boundary.
Context in High-Level Scoping: During the initial phases of an assessment, a C3PAO must distinguish between the entire corporation (the OSC) and the specific parts of that corporation that are actually performing the DoD work. The Host Unit is that functional or logical division that will be evaluated against the CMMC practices.
Relationship to other units:
Supporting Organization/Units (Option D): These are entities that provide services to the Host Unit (such as an enterprise IT department or a separate HR branch) but are not the primary "Host" of the CUI/FCI. They are in-scope because they provide "Security Protection" or "Administrative" functions to the Host Unit.
Coordinating Unit (Option C): This term is often used in broader organizational contexts but is not a defined scoping term for the "people, processes, and technology" being assessed under the CMMC CAP.
Reference Documents:
CMMC Assessment Process (CAP) v1.0: Glossary and Section 1 (Plan and Prepare Assessment), which defines the relationship between the OSC, the Host Unit, and Supporting Units.
CMMC Level 2 Scoping Guidance: Provides the framework for identifying the "assets" (people, technology, facilities) that reside within the Host Unit boundary.
CCP Study Guide: Section on "Scoping the Assessment," which explains how to identify the Host Unit versus External Service Providers (ESPs).
Who makes the final determination of the assessment method used for each practice?
CCP
osc
Site Manager
Lead Assessor
Who Determines the Assessment Method for Each Practice?
In aCMMC Level 2 Assessment, theLead Assessorhas thefinal authorityin determining theassessment methodused to evaluate each practice.
Key Responsibilities of the Lead Assessor
?Ensures theCMMC Assessment Process (CAP) Guideis followed.
?Determines whether a practice is evaluated usinginterviews, demonstrations, or document reviews.
?Directs theCertified CMMC Professionals (CCPs)and other assessors on themethodologyfor gathering evidence.
?Works under aCertified Third-Party Assessment Organization (C3PAO)to ensure proper assessment execution.
Why "Lead Assessor" is Correct?
CCP (Option A) assists in the assessment but does not make final decisionson methods.
OSC (Option B) is the Organization Seeking Certification, and they do not control assessment methodology.
Site Manager (Option C) may coordinate logistics but has no authority over assessment decisions.
Breakdown of Answer Choices
Option
Description
Correct?
A. CCP
?Incorrect–A CCPassistsbut doesnot determine assessment methods.
B. OSC
?Incorrect–The OSC is beingassessedand does not decide assessment methods.
C. Site Manager
?Incorrect–The Site Manager handles logistics butdoes not control assessment methods.
D. Lead Assessor
?Correct – The Lead Assessor has the final say on the assessment method used.
Official References from CMMC 2.0 Documentation
CMMC Assessment Process Guide (CAP)– Defines theLead Assessor’s rolein determining assessment methods.
Final Verification and Conclusion
The correct answer isD. Lead Assessor, as they havefinal decision-making authority over the assessment methodology.
Which domain has a practice requiring an organization to restrict, disable, or prevent the use of nonessential programs?
Access Control (AC)
Media Protection (MP)
Asset Management (AM)
Configuration Management (CM)
Understanding the Role of Configuration Management (CM) in CMMC 2.0
TheConfiguration Management (CM) domainin CMMC 2.0 ensures that systems aresecurely configured and maintainedto prevent unauthorized or unnecessary changes that could introduce vulnerabilities. One key requirement in CM is torestrict, disable, or prevent the use of nonessential programsto reduce security risks.
Relevant CMMC 2.0 Practice:
CM.L2-3.4.1 – Establish and enforce security configuration settings for information technology products employed in organizational systems.
This practicerequires organizations to control system configurations, including the removal or restriction ofnonessential programs, functions, ports, and servicestoreduce attack surfaces.
The goal is tominimize exposure to cyber threatsby ensuring only necessary and approved software is running on the system.
Why is the Correct Answer CM (D)?
A. Access Control (AC) ? Incorrect
Access Control (AC) focuses onmanaging user permissions and accessto systems and data, not restricting programs.
B. Media Protection (MP) ? Incorrect
Media Protection (MP) deals withprotecting and controlling removable media(e.g., USBs, hard drives) rather than software or system configurations.
C. Asset Management (AM) ? Incorrect
Asset Management (AM) is aboutidentifying and tracking IT assets, not configuring or restricting software.
D. Configuration Management (CM) ? Correct
CM explicitly coverssecuring system configurationsbyrestricting nonessential programs, ports, services, and functions, making it the correct answer.
CMMC 2.0 References Supporting this Answer:
CMMC 2.0 Practice CM.L2-3.4.1(Security Configuration Management)
Requires organizations toenforce security configuration settingsandremove unnecessary programsto protect systems.
NIST SP 800-171 Requirement 3.4.1
Supportssecure configuration settingsandrestricting unauthorized applicationsto prevent security risks.
CMMC 2.0 Level 2 Requirement
This practice is aLevel 2 (Advanced) requirement, meaningorganizations handling Controlled Unclassified Information (CUI)must comply with it.
The results package for a Level 2 Assessment is being submitted. What MUST a Final Report. CMMC Assessment Results include?
Affirmation for each practice or control
Documented rationale for each failed practice
Suggested improvements for each failed practice
Gaps or deltas due to any reciprocity model are recorded as met
Understanding the CMMC Level 2 Final Report Requirements
For aCMMC Level 2 Assessment, theFinal CMMC Assessment Results Reportmust include:
Assessment findings for each practice
Final ratings (MET or NOT MET) for each practice
A detailed rationale for each practice rated as NOT MET
Why "B. Documented rationale for each failed practice" is Correct?
The CMMC Assessment Process (CAP) Guidestates that if a practice is markedNOT MET, theassessors must provide a rationale explaining why it failed.
This rationale helps theOSC understand what needs remediationand, if applicable, whether the deficiency can be addressed via aPlan of Action & Milestones (POA & M).
TheFinal Report serves as an official recordand must be submitted as part of theresults package.
Why Other Answers Are Incorrect?
A. Affirmation for each practice or control (Incorrect)
While the report includes aMET/NOT MET ratingfor each practice,affirmation is not a required component.
C. Suggested improvements for each failed practice (Incorrect)
Assessors do not provide recommendations for improvement—they only document findings and rationale.
Providing suggestions would create aconflict of interestperCMMC-AB Code of Professional Conduct.
D. Gaps or deltas due to any reciprocity model are recorded as met (Incorrect)
If an organization isleveraging reciprocity (e.g., FedRAMP, Joint Surveillance Voluntary Assessments), gapsmust still be documented—not automatically marked as "MET."
Conclusion
The correct answer isB. Documented rationale for each failed practice, as this is amandatory requirement in the Final CMMC Assessment Results Report.
An OSC has submitted evidence for an upcoming assessment. The assessor reviews the evidence and determines it is not adequate or sufficient to meet the CMMC practice. What can the assessor do?
Notify the CMMC-AB.
Cancel the assessment.
Postpone the assessment.
Contact the C3PAO for guidance.
CAP v2.0 makes “assessment readiness” a formal gate in Phase 1 (Conduct the Pre-Assessment) . The purpose of Phase 1 is for the C3PAO to evaluate whether the OSC has adequately prepared for the assessment of its Level 2 security requirements. If evidence submitted ahead of the assessment is found to be insufficient such that the OSC is not prepared to proceed, CAP describes an Adverse Determination of Assessment Readiness : the Lead CCA should inform the Affirming Official and provide a written explanation for recommending the assessment be suspended —without giving remedial advice.
CAP then addresses what happens next: if the OSC decides to cancel or postpone the assessment, both parties should settle affairs per the agreement (including return of proprietary information), and they may discuss revisiting the assessment when the OSC is fully prepared. This maps directly to “Postpone the assessment” as the best answer.
The other options don’t match CAP’s prescribed handling. CAP does not require notifying the Cyber AB for routine evidence insufficiency (A). “Cancel” (B) is an OSC decision path, but CAP explicitly calls out postponement/suspension as the appropriate procedural response to lack of readiness. “Contact the C3PAO for guidance” (D) is unnecessary framing here because the assessor/Lead CCA is acting on behalf of the C3PAO under CAP’s Phase 1 readiness determination and suspension process.
===========
Which organization is the governmental authority responsible for identifying and marking CUI?
NARA
NIST
CMMC-AB
Department of Homeland Security
Step 1: Define CUI (Controlled Unclassified Information)
CUI is information thatrequires safeguarding or dissemination controlspursuant to and consistent with applicable law, regulations, and government-wide policies, butis not classifiedunder Executive Order 13526 or the Atomic Energy Act.
?Step 2: Authority over CUI — NARA’s Role
NARA – National Archives and Records Administration, specifically theInformation Security Oversight Office (ISOO), is thegovernment-wide executive agentresponsible for implementing the CUI program.
Source:
32 CFR Part 2002 – Controlled Unclassified Information (CUI)
Executive Order 13556 – Controlled Unclassified Information
CUI Registry – https://www.archives.gov/cui
NARA:
Maintains theCUI Registry,
Issuesmarking and handling guidance,
DefinesCUI categoriesand their authority under law or regulation,
Trains and informs Federal agencies and contractors on CUI policy.
?Why the Other Options Are Incorrect
B. NIST
?NIST (National Institute of Standards and Technology) developstechnical standards(e.g., SP 800-171), but it doesnot define or mark CUI. It helps secure CUI once it’s identified.
C. CMMC-AB (now Cyber AB)
?The Cyber AB is theCMMC ecosystem’s accreditation body, not a government agency, and hasno authority over CUI classification or marking.
D. Department of Homeland Security (DHS)
?While DHS mayhandle and protect CUI internally, it is not the executive agent for the CUI program.
NARAis theofficial U.S. government authorityresponsible for defining, categorizing, and marking CUI via theCUI Registryand associated policies underExecutive Order 13556.
Which term describes a group of individuals that conduct operational network vulnerability evaluations and provide mitigation techniques to customers?
Red team
Blue team
White hat hackers
Penetration test team
The best match is Penetration test team because penetration testing is an authorized, structured security evaluation intended to find vulnerabilities in systems or networks and produce results that enable remediation/mitigation .
Authoritatively, NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment) is a primary federal reference for technical security testing. It describes the purpose of technical testing as helping organizations plan and conduct tests , analyze findings , and develop mitigation strategies —which aligns directly with “vulnerability evaluations” and “providing mitigation techniques.” The DoD also points its Components to NIST SP 800-115 as guidance for penetration testing activities.
By contrast, a Red Team is typically framed as an “ethical adversary” that emulates attackers to test detection/response and overall readiness; it is often broader, scenario-driven, and focused on demonstrating what a capable adversary can accomplish rather than performing a scoped vulnerability evaluation with remediation-oriented outputs. A Blue Team is primarily defensive operations (monitoring, detection, response), not the group defined by conducting vulnerability evaluations for customers. “ White hat hackers ” is a general label for ethical hackers, but it is less specific than the established service construct of a penetration test team .
Because the question emphasizes operational network vulnerability evaluations plus mitigation techniques , the most precise and standard term is D: Penetration test team , supported by NIST’s testing-and-mitigation framing.
Which regulation allows for whistleblowers to sue on behalf of the federal government?
NISTSP 800-53
NISTSP 800-171
False Claims Act
Code of Professional Conduct
Understanding the False Claims Act (FCA) and Whistleblower Protections
TheFalse Claims Act (FCA)(31 U.S.C. §§ 3729–3733) is aU.S. federal lawthat allowswhistleblowers (also known as "relators")to sue on behalf of the federal government if they believe a company issubmitting fraudulent claimsfor government funds.
The FCA includes a"qui tam" provision, which:
?Allows private individuals to file lawsuits on behalf of the U.S. government.
?Provides financial rewards to whistleblowersif the lawsuit results in recovered funds.
?Protects whistleblowers from employer retaliation.
In the context ofCMMC and cybersecurity compliance, theFCA has been used to hold companies accountableformisrepresenting their cybersecurity compliancewhen working with federal contracts.
For example:
If a companyfalsely claimscompliance withCMMC, NIST SP 800-171, or DFARS 252.204-7012butfails to meet security requirements, it could beliable under the FCA.
TheDepartment of Justice (DOJ)has pursued cases under theCyber-Fraud Initiative, using theFCA against defense contractorsfor cybersecurity noncompliance.
Thus, the correct answer isC. False Claims Actbecause it specifically allows whistleblowers tosue on behalf of the federal government.
Why the Other Answers Are Incorrect
A. NIST SP 800-53
?Incorrect.NIST SP 800-53provides security controls for federal agencies butdoes notcontain whistleblower provisions.
B. NIST SP 800-171
?Incorrect.NIST SP 800-171outlines security requirements for protectingCUI, but itdoes not have legal mechanismsfor whistleblower lawsuits.
D. Code of Professional Conduct
?Incorrect. TheCMMC Code of Professional Conductapplies toC3PAOs and assessorsbut doesnot provide a legal basis for whistleblower lawsuits.
CMMC Official References
False Claims Act (31 U.S.C. §§ 3729–3733)– Establishes whistleblower protections and qui tam lawsuits.
DOJ Cyber-Fraud Initiative– Uses the FCA to enforce cybersecurity compliance in government contracts.
DFARS 252.204-7012 & CMMC– Require accurate reporting of cybersecurity compliance, which can lead to FCA violations if misrepresented.
Thus,option C (False Claims Act) is the correct answeras per official legal guidance.
In the Code of Professional Conduct, what does the practice of Professionalism require?
Do not copy materials without permission to do so.
Do not make assertions about assessment outcomes.
Refrain from dishonesty in all dealings regarding CMMC.
Ensure the security of all information discovered or received.
What Does the Practice of Professionalism Require in the CMMC Code of Professional Conduct?
TheCMMC Code of Professional Conduct (CoPC)sets ethical and professional standards forCertified CMMC Assessors (CCAs) and Certified CMMC Professionals (CCPs).Professionalismrequireshonesty and integrity in all CMMC-related activities.
Step-by-Step Breakdown:
?1. Professionalism Requires Ethical Behavior
TheCoPC states that professionalismincludes:
Acting with integrityin all assessment-related activities.
Providing truthful and objective assessmentsof cybersecurity practices.
Avoiding deceptive or misleading claimsabout assessments or compliance.
?2. Why the Other Answer Choices Are Incorrect:
(A) Do not copy materials without permission to do so?
This falls underIntellectual Property (IP) protection, notProfessionalism.
(B) Do not make assertions about assessment outcomes?
Assessorsmustprovide findings based on evidence. The rule is aboutnot making false or misleading claims, not about avoiding assertions altogether.
(D) Ensure the security of all information discovered or received?
This falls underConfidentiality, notProfessionalism.
Final Validation from CMMC Documentation:
TheCMMC Code of Professional Conduct (CoPC)definesProfessionalism as requiring honesty and integrityin allCMMC-related activities.
Thus, the correct answer is:
?C. Refrain from dishonesty in all dealings regarding CMMC.
While conducting a CMMC Assessment, a Lead Assessor is given documentation attesting to Level 1 identification and authentication practices by the OSC. The Lead Assessor asks the CCP to review the documentation to determine if identification and authentication controls are met. Which documentation BEST satisfies the requirements of IA.L1-3.5.1: Identify system users. processes acting on behalf of users, and devices?
Procedures for implementing access control lists
List of unauthorized users that identifies their identities and roles
User names associated with system accounts assigned to those individuals
Physical access policy that states. "All non-employees must wear a special visitor pass or be escorted."
Understanding IA.L1-3.5.1 (Identification and Authentication Requirements)
TheCMMC 2.0 Level 1practiceIA.L1-3.5.1aligns withNIST SP 800-171, Requirement 3.5.1, which mandates that organizationsidentify system users, processes acting on behalf of users, and devicesto ensure proper access control.
To comply with this requirement, anOrganization Seeking Certification (OSC)must maintain documentation that demonstrates:
A unique identifier (username) for each system user
Mapping of system accounts to specific individuals
Identification of devices and automated processes that access systems
Why "C. User names associated with system accounts assigned to those individuals" is Correct?
This documentation directly satisfies IA.L1-3.5.1because it showshow system users are uniquely identified and linked to specific accountswithin the environment.
Alist of users and their assigned accountsconfirms that the organization has a structured method oftracking access and authentication.
It allows auditors to verify thateach user has a distinct identityand that access control mechanisms are properly applied.
Why Other Answers Are Incorrect?
A. Procedures for implementing access control lists (Incorrect)
While access control lists (ACLs) are relevant for authorization, they do notidentify users or devicesspecifically, making them insufficient as primary evidence for IA.L1-3.5.1.
B. List of unauthorized users that identifies their identities and roles (Incorrect)
Identifying unauthorized users does not fulfill the requirement of trackingauthorizedusers, devices, and processes.
D. Physical access policy stating "All non-employees must wear a special visitor pass or be escorted" (Incorrect)
This pertains tophysical security, not system-baseduser identification and authentication.
Conclusion
The correct answer isC. User names associated with system accounts assigned to those individuals, as thisdirectly satisfies the identification requirement of IA.L1-3.5.1.
When an OSC requests an assessment by a C3PAO, who selects the Lead Assessor for the assessment?
OSC
C3PAO
C3PAO and OSC
OSC and Lead Assessor
The CAP specifies that the C3PAO is responsible for assigning the Lead Assessor to an OSC’s assessment. While the OSC contracts with the C3PAO, the authority to appoint the Lead Assessor resides solely with the C3PAO.
Supporting Extracts from Official Content:
CAP v2.0, Assessment Team Composition (§2.10): “The C3PAO shall designate a qualified Lead Assessor to lead the assessment.”
Why Option B is Correct:
Only the C3PAO has the authority to select and assign the Lead Assessor.
The OSC may influence scheduling and planning but cannot appoint assessors.
Options A, C, and D are inconsistent with CAP requirements.
References (Official CMMC v2.0 Content):
CMMC Assessment Process (CAP) v2.0, Assessment Team Roles and Responsibilities (§2.10).
During a Level 2 Assessment, an OSC provides documentation that attests that they utilize multifactor authentication on nonlocal remote maintenance sessions. The OSC feels that they have met the controls for the Level 2 certification. What additional measures should the OSC perform to fully meet the maintenance requirement?
Connections for nonlocal maintenance sessions should be terminated when maintenance is complete.
Connections for nonlocal maintenance sessions should be unlimited to ensure maintenance is performed properly
The nonlocal maintenance personnel complain that restrictions slow down their response time and should be removed.
The maintenance policy states multifactor authentication must have at least two factors applied for nonlocal maintenance sessions.
Under CMMC 2.0 Level 2, which aligns with the requirements of NIST SP 800-171, maintaining robust control over nonlocal maintenance sessions is critical. While multifactor authentication (MFA) is a required safeguard for secure access, additional measures must be implemented to fully meet the maintenance requirements as outlined in Control 3.3.5:
Key Requirements for Nonlocal Maintenance:
Termination of Nonlocal Maintenance Sessions:
To reduce the attack surface and prevent unauthorized access, nonlocal maintenance connections must be terminated immediately after the maintenance activity is completed. This is a direct requirement to mitigate risks associated with lingering remote sessions that could be exploited by threat actors.
Supporting Reference: NIST SP 800-171, Control 3.3.5 states: "Ensure that remote maintenance is conducted in a controlled manner and disable connections immediately after use."
Multifactor Authentication (MFA):
OSCs are required to implement MFA for nonlocal remote maintenance sessions. MFA must include at least two factors (e.g., something you know, something you have, or something you are).
While the OSC’s use of MFA satisfies part of the requirement, it does not complete the control unless proper termination procedures are in place.
Policy and Procedure Adherence:
The OSC must also document a maintenance policy and ensure it reflects the need for terminating connections post-maintenance. The policy should outline roles, responsibilities, and steps for ensuring secure nonlocal maintenance practices.
Incorrect Options:
B. Unlimited connections: Allowing unrestricted nonlocal maintenance sessions is a significant security risk and violates the principle of least privilege.
C. Removing restrictions: Removing restrictions for convenience directly undermines compliance and security.
D. Multifactor authentication details: While MFA is necessary, the question states the OSC already uses it. Termination of sessions is the missing requirement.
Conclusion:
The requirement to terminate nonlocal maintenance sessions after maintenance is complete (Option A) is critical for compliance with CMMC 2.0 Level 2 and NIST SP 800-171, Control 3.3.5. This ensures that nonlocal maintenance activities are secured against unauthorized access and potential vulnerabilities.
As part of CMMC 2.0, the change to Level 1 Self-Assessments supports "reduced assessment costs" allows all companies at Level 1 (Foundational) to:
to conduct self-assessments.
opt out of CMMC Assessments.
have assessment costs reimbursed by the DoD.
pay no more than $500.00 for their annual assessment.
Step 1: Review CMMC 2.0 Reforms (Level 1 – Foundational)
As part ofCMMC 2.0, the DoD announced changes toreduce burden and costsfor companies that only handleFederal Contract Information (FCI):
DoD Statement (CMMC 2.0 Overview):
“Level 1 (Foundational) will only require an annual self-assessment, affirming implementation of the 17 FAR 52.204-21 controls.”
?Step 2: Intent of “Reduced Assessment Costs”
The move to allowself-assessments at Level 1was explicitly designed toeliminate the costof hiring third-party assessors for organizations that only handle FCI.
Level 1 self-assessments are:
Conductedinternally by the OSC,
Affirmed annuallyby a senior company official,
Submitted via SPRS(Supplier Performance Risk System).
?Why the Other Options Are Incorrect
B. Opt out of CMMC Assessments
?Incorrect. Organizations must still perform aself-assessmentannually — they cannot opt out entirely.
C. Have assessment costs reimbursed by the DoD
?No such reimbursement mechanism exists.
D. Pay no more than $500.00…
?No such fixed cost is set or guaranteed in CMMC documentation.
UnderCMMC 2.0, all companies atLevel 1 (Foundational)are permitted toconduct self-assessmentsannually to demonstrate compliance, supporting the DoD’s goal ofreducing assessment costsfor low-risk contractors.
What type of information is NOT intended for public release and is provided by or generated for the government under a contract to develop or deliver a product or service to the government, but not including information provided by the government to the public (such as on public websites) or simple transactional information, such as necessary to process payments?
CDI
CTI
CUI
FCI
Understanding Federal Contract Information (FCI)
Federal Contract Information (FCI) is defined by48 CFR 52.204-21(Basic Safeguarding of Covered Contractor Information Systems). FCI refers to information that:
Is NOT intended for public release.
Is provided by or generated for the government under a contract.
Is necessary to develop or deliver a product or service to the government.
Excludes publicly available government information(such as information on public websites).
Excludes simple transactional information(e.g., necessary to process payments).
In the context ofCMMC 2.0, organizations thatprocess, store, or transmit FCImust meetCMMC Level 1 (Foundational), which requires implementing17 basic safeguarding practicesoutlined inFAR 52.204-21.
Why is the Correct Answer FCI (D)?
A. CDI (Controlled Defense Information)? Incorrect
This term was used inDFARS 252.204-7012but has been replaced byCUI (Controlled Unclassified Information)in CMMC discussions.
B. CTI (Cyber Threat Intelligence)? Incorrect
This refers to intelligence on cyber threats, tactics, and indicators, not contractual data.
C. CUI (Controlled Unclassified Information)? Incorrect
CUI is sensitive information requiring additional safeguarding but is a separate category from FCI.
D. FCI (Federal Contract Information)?Correct
The definition of FCI explicitly matches the description given in the question.
CMMC 2.0 References Supporting this Answer:
FAR 52.204-21 (Basic Safeguarding of Covered Contractor Information Systems)
Defines FCI and the required safeguards.
Establishes17 cybersecurity practicesfor FCI protection.
CMMC 2.0 Framework
Level 1 (Foundational)is required for contractors handlingFCI.
Ensures compliance withbasic safeguarding requirementsoutlined inFAR 52.204-21.
NIST SP 800-171 and DFARS 252.204-7012
FCI doesnotrequire compliance withNIST SP 800-171, butCUI does.
A Lead Assessor is presenting an assessment kickoff and opening briefing. What topic MUST be included?
Gathering evidence
Review of the OSC's SSP
Overview of the assessment process
Examination of the artifacts for sufficiency
What is Required in the CMMC Assessment Kickoff and Opening Briefing?
Before starting aCMMC assessment, theLead Assessormust present anopening briefingto ensure that theOrganization Seeking Certification (OSC)understands the assessment process.
Step-by-Step Breakdown:
?1. Overview of the Assessment Process
The Lead Assessormust explain the CMMC assessment methodology, including:
Theassessment objectives and scope
How theassessment team will review security controls
What to expectduring interviews, testing, and document review
This ensurestransparency and alignmentbetween the assessors and the OSC.
?2. Why the Other Answer Choices Are Incorrect:
(A) Gathering Evidence?
Evidence collection is part of the assessment butnot the primary topic of the opening briefing.
(B) Review of the OSC's SSP?
While theSSP is a key document, reviewing it is part of the assessment,not the kickoff briefing.
(D) Examination of the artifacts for sufficiency?
Artifact review happens laterin the assessment process,not during the kickoff.
Final Validation from CMMC Documentation:
TheCMMC Assessment Process Guidestates that theopening briefing must include an overview of the assessment process, ensuring the OSC understands the expectations and methodology.
Thus, the correct answer is:
?C. Overview of the assessment process.
A test or demonstration is being performed for the Assessment Team during an assessment. Which environment MUST the OSC perform this test or demonstration?
Client
Production
Development
Demonstration
Understanding the Assessment Environment Requirement
During aCMMC Level 2 assessment, assessors requireobjective evidencethat security controls are implementedin the actual operating environmentwhereControlled Unclassified Information (CUI)is handled.
This means thattests or demonstrations must be conducted in the production environment, where the organization’s real systems and security controls are in use.
Why Option B (Production) is Correct
Assessment teams need to validate security controls in the actual environment where they are applied, ensuring that security measures are in effect in thereal-world operating conditions.
Option A (Client)is incorrect because "Client" is not a defined assessment environment.
Option C (Development)is incorrect because testing in a development environmentdoes not accurately represent the production security posture.
Option D (Demonstration)is incorrect becausedemonstrations in a separate test environment do not provide valid evidence for CMMC assessments—actual security implementations must be verified in production.
Official CMMC Documentation References
CMMC Assessment Process (CAP) Guide – Section 3.5 (Assessment Methods)
NIST SP 800-171 Assessment Procedures(Verification must occur in the actual system where CUI resides.)
Final Verification
SinceCMMC assessments require security controls to be validated in the actual production environment, the correct answer isOption B: Production.
Where can a listing of all federal agencies' CUI indices and categories be found?
32 CFR Section 2002
Official CUI Registry
Executive Order 13556
Official CMMC Registry
Understanding the Official CUI Registry
TheControlled Unclassified Information (CUI) Registryis theauthoritative sourcefor all federal agencies'CUI categories and indices. It is maintained by theNational Archives and Records Administration (NARA)and provides:
?Acomprehensive listof CUI categories and subcategories.
?Details onwho can handle, store, and share CUI.
?Guidance onCUI marking and safeguarding requirements.
Why "Official CUI Registry" is Correct?
TheOfficial CUI Registryis theonly federal resourcethat listsall CUI categories and agencies that use them.
32 CFR Section 2002(Option A) definesCUI policiesbut doesnotprovide a full listing of CUI categories.
Executive Order 13556(Option C) established theCUI Programbut doesnotmaintain an active list of categories.
The "Official CMMC Registry" (Option D) does not exist—CMMC is a security framework, not a CUI classification system.
Breakdown of Answer Choices
Option
Description
Correct?
A. 32 CFR Section 2002
?Incorrect–Defines CUI program rules butdoes not listcategories.
B. Official CUI Registry
?Correct – The registry contains the full list of CUI categories.
C. Executive Order 13556
?Incorrect–Established the CUI program butdoes not maintain a category list.
D. Official CMMC Registry
?Incorrect–No such registry exists; CMMC is a cybersecurity framework, not a CUI classification system.
Official References from CMMC 2.0 and Federal Documentation
National Archives (NARA) CUI Registry– The authoritative source forall federal agency CUI categories.
32 CFR 2002– Provides CUIpolicy guidancebut refers agencies to theOfficial CUI Registryfor classification.
Final Verification and Conclusion
The correct answer isB. Official CUI Registry, as it is theonly official source listing all federal agencies' CUI indices and categories.
Recording evidence as adequate is defined as the criteria needed to:
verify, based on an assessment and organizational scope.
verify, based on an assessment and organizational practice.
determine if a given artifact, interview response, demonstration, or test meets the CMMC scope.
determine if a given artifact, interview response, demonstration, or test meets the CMMC practice.
Understanding "Adequate Evidence" in the CMMC Assessment Process
In aCMMC assessment,adequate evidencerefers to the proof required to demonstrate that a specific cybersecurity practice has been implemented correctly. Evidence can come from:
Artifacts(e.g., security policies, system configurations, logs).
Interview responses(e.g., verbal confirmation from personnel about their responsibilities).
Demonstrations(e.g., showing how a security control is implemented in real time).
Testing(e.g., verifying technical security mechanisms such as multi-factor authentication).
Thegoalof evidence collection is to determinewhether a CMMC practice is met—not just whether the organization operates within the assessment scope.
Why is the Correct Answer "Determine if a given artifact, interview response, demonstration, or test meets the CMMC practice" (D)?
A. Verify, based on an assessment and organizational scope ? Incorrect
Theassessment scopedefineswhat is evaluated, but adequacy of evidence is based oncompliance with specific CMMC practices.
B. Verify, based on an assessment and organizational practice ? Incorrect
CMMC assessments focus on cybersecurity practices defined in the CMMC framework, not just general organizational practices.
C. Determine if a given artifact, interview response, demonstration, or test meets the CMMC scope ? Incorrect
Thescopedefines the assessment boundaries, but theassessment team's job is to confirm whether CMMC practices are satisfied.
D. Determine if a given artifact, interview response, demonstration, or test meets the CMMC practice ? Correct
TheCMMC assessment process focuses on ensuring that required practices are implemented, making this the correct answer.
CMMC 2.0 References Supporting this Answer:
CMMC Assessment Process (CAP) Document
Defines "adequate evidence" asproof that a CMMC practice has been correctly implemented.
CMMC 2.0 Assessment Criteria
Specifies that evidence must beevaluated against specific cybersecurity practices.
NIST SP 800-171A (Assessment Procedures for NIST SP 800-171)
Provides guidance on evaluating artifacts, interviews, demonstrations, and testing to confirm compliance with required practices.
Final Answer:
?D. Determine if a given artifact, interview response, demonstration, or test meets the CMMC practice.
An organization's sales representative is tasked with entering FCI data into various fields within a spreadsheet on a company-issued laptop. This laptop is an FCI Asset being used to:
process and transmit FCI.
process and organize FCI.
store, process, and transmit FCI.
store, process, and organize FCI.
According to the CMMC Scoping Guidance, Level 1, the fundamental definition of an FCI Asset is any asset that performs at least one of three primary functions with Federal Contract Information (FCI). These functions are consistently defined across both Level 1 and Level 2 documentation as Processing, Storing, or Transmitting.
Process: In this scenario, the sales representative is "entering FCI data into various fields." The act of inputting, manipulating, or editing data within an application (the spreadsheet) is the definition of processing.
Store: Because the spreadsheet is on the laptop, the data resides on the laptop's hard drive or memory. This constitutes storing.
Transmit: While the prompt focuses on the data entry, a laptop is an endpoint designed to move data across a network (email, cloud uploads, or server saves). In the context of CMMC scoping, assets that handle protected information are categorized by their capability and role in the data lifecycle, which includes transmitting.
Why other options are incorrect:
Options B and D: These include the word "organize." While organizing data is a task a human performs, it is not a formal technical term used in the CMMC or NIST SP 800-171/FAR 52.204-21 definitions to categorize asset functions.
Option A: This option omits "store." Since the spreadsheet exists on the laptop, storage is a primary function being utilized.
Reference Documents:
CMMC Scoping Guidance, Level 1 (Version 2.0): Section 2.0, which defines FCI Assets as assets that "process, store, or transmit FCI."
FAR 52.204-21 (Basic Safeguarding of Covered Contractor Information Systems): The regulatory source for Level 1, which applies to systems that "process, store, or transmit" federal contract information.
CMMC Assessment Guide, Level 1: Introduction and Scoping sections, reinforcing the triad of data handling functions.
Which statement BEST describes the key references a Lead Assessor should refer to and use the:
DoD adequate security checklist for covered defense information.
CMMC Model Overview as it provides assessment methods and objects.
safeguarding requirements from FAR Clause 52.204-21 for a Level 2 Assessment.
published CMMC Assessment Guide practice descriptions for the desired certification level.
Key References for a Lead Assessor in a CMMC Assessment
ALead Assessorconducting aCMMC assessmentmust rely onofficial CMMC guidance documentsto evaluate whether anOrganization Seeking Certification (OSC)meets the required cybersecurity practices.
Most Relevant Reference: CMMC Assessment Guide
TheCMMC Assessment Guideprovidesdetailed descriptionsof eachpractice and processat the specificCMMC level being assessed.
It defines:
?Theassessment objectivesfor each practice.
?Therequired evidencefor compliance.
?Thescoring criteriato determine if a practice isMET or NOT MET.
Why is the Correct Answer "D. Published CMMC Assessment Guide practice descriptions for the desired certification level"?
A. DoD adequate security checklist for covered defense information ? Incorrect
TheDoD adequate security checklistis related toDFARS 252.204-7012 compliance, butCMMC assessmentsfollow theCMMC Assessment Guide.
B. CMMC Model Overview as it provides assessment methods and objects ? Incorrect
TheCMMC Model Overviewprovideshigh-level guidance, butdoes not contain specific assessment criteria.
C. Safeguarding requirements from FAR Clause 52.204-21 for a Level 2 Assessment ? Incorrect
FAR 52.204-21is relevant toCMMC Level 1 (FCI protection), butCMMC Level 2 follows NIST SP 800-171and requiresCMMC Assessment Guidesfor validation.
D. Published CMMC Assessment Guide practice descriptions for the desired certification level ? Correct
TheCMMC Assessment Guideis theofficial documentused to determine if anOSC meets the required security practices for certification.
CMMC 2.0 References Supporting This Answer:
CMMC Assessment Process (CAP) Document
Specifies thatLead Assessors must use the CMMC Assessment Guidefor official scoring.
CMMC Assessment Guide for Level 1 & Level 2
Providesdetailed descriptions, assessment methods, and scoring criteriafor each practice.
CMMC-AB Guidance for Certified Third-Party Assessment Organizations (C3PAOs)
Confirms thatCMMC assessments must follow the Assessment Guide, not general DoD security policies.
Final Answer:
?D. Published CMMC Assessment Guide practice descriptions for the desired certification level.
Contractor scoping requirements for a CMMC Level 2 Assessment to document the asset in an inventory, in the SSP and on the network diagram apply to:
GUI Assets.
CUI and Security Protection Asset categories.
all asset categories except for the Out-of-scope Assets.
Contractor Risk Managed Assets and Specialized Assets.
According to the CMMC Scoping Guidance, Level 2, assets are categorized to determine the level of assessment rigor required. The requirement to document an asset in the Asset Inventory, the System Security Plan (SSP), and on the Network Diagram is a specific administrative requirement for high-priority asset classes.
CUI Assets: These are assets that process, store, or transmit Controlled Unclassified Information (CUI). They are part of the "Assessed" group and must be fully documented in the inventory, SSP, and network diagram.
Security Protection Assets (SPA): These are assets that provide security functions or capabilities to the assessment scope (e.g., firewalls, log servers, or AV management consoles), even if they do not process CUI themselves. Because they are critical to the security of CUI, they must also be documented in the inventory, SSP, and network diagram.
Why other options are incorrect:
Option A: "GUI Assets" is likely a typo or misnomer in this context (possibly meant to refer to CUI assets or a distractor).
Option C: This is incorrect because Contractor Risk Managed Assets (CRMA) and Specialized Assets have different documentation requirements. For instance, while CRMA are documented in the inventory and SSP, they are often not required to be on the network diagram in the same detail as CUI assets, depending on the specific assessment boundary. Out-of-Scope Assets are not documented at all.
Option D: Contractor Risk Managed Assets (CRMA) and Specialized Assets (like IoT, OT, or Restricted Information Systems) are required to be in the Asset Inventory and SSP, but the CMMC Scoping Guidance specifies that the most stringent documentation (Inventory + SSP + Network Diagram) is the primary mandate for those assets directly handling CUI or protecting it (SPAs).
Reference Documents:
CMMC Scoping Guidance, Level 2 (Version 2.0/2.1): Section 3.0, Table 1 (CUI Assets) and Table 2 (Security Protection Assets), which explicitly list the "Documentation Requirements" for each category.
CMMC Assessment Process (CAP): Section on Scoping Boundaries and Evidence Validation.
Which are guiding principles in the CMMC Code of Professional Conduct?
Objectivity, information integrity, and higher accountability
Objectivity, information integrity, and proper use of methods
Proper use of methods, higher accountability, and objectivity
Proper use of methods, higher accountability, and information integrity
The CMMC Code of Professional Conduct applies to all CMMC assessors, practitioners, and ecosystem participants. Its guiding principles are: Objectivity, Information Integrity, and Higher Accountability.
Supporting Extracts from Official Content:
CMMC Code of Professional Conduct: “Guiding principles… include Objectivity, Information Integrity, and Higher Accountability.”
Why Option A is Correct:
These three principles are the official guiding values documented in the Code of Professional Conduct.
Options B, C, and D insert terms (“proper use of methods”) that are not part of the official guiding principles.
References (Official CMMC v2.0 Content):
CMMC Code of Professional Conduct.
===========
An assessor is in Phase 3 of the CMMC Assessment Process. The assessor has delivered the final findings, submitted the assessment results package, and provided feedback to the C3PAO and CMMC-AB. What must the assessor still do?
Determine level recommendation
Archive all assessment artifacts
Determine final practice pass/fail results
Archive or dispose of any assessment artifacts
In Phase 3 (Post-Assessment), the assessor’s responsibility is to archive or dispose of assessment artifacts according to the C3PAO’s policies and retention requirements. By this point, final findings and results have already been delivered, so the only remaining step is ensuring proper handling of assessment materials.
Supporting Extracts from Official Content:
CAP v2.0, Post-Assessment Activities (§3.17): “The assessor must archive or dispose of any assessment artifacts in accordance with the C3PAO’s retention and destruction policy.”
Why Option D is Correct:
Determining practice pass/fail results and level recommendations occurs earlier in Phases 2 and 3.
The final step left for the assessor is the proper archiving or destruction of artifacts.
References (Official CMMC v2.0 Content):
CMMC Assessment Process (CAP) v2.0, Phase 3: Post-Assessment (§3.17).
===========
How does the CMMC define a practice?
A business transaction
A condition arrived at by experience or exercise
A series of changes taking place in a defined manner
An activity or activities performed to meet defined CMMC objectives
Understanding the Definition of a "Practice" in CMMC 2.0
In CMMC 2.0, the term"practice"refers to specific cybersecurity activities that organizations must implement to achieve compliance with defined security objectives.
Step-by-Step Breakdown:
Definition from CMMC Documentation:
According to theCMMC Model Overview, apracticeis defined as:
"An activity or activities performed to meet defined CMMC objectives."
This means that practices are theactions and implementations required to protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI).
How Practices Fit into CMMC 2.0:
CMMC 2.0 Level 1 consists of17 practices, which align withFAR 52.204-21 (Basic Safeguarding of Covered Contractor Information Systems).
CMMC 2.0 Level 2 consists of110 practices, aligned directly withNIST SP 800-171 Rev. 2.
Each practice has anobjectivethat must be met to demonstrate compliance.
Official CMMC 2.0 References:
TheCMMC 2.0 Model Documentationdefines practices as "the fundamental cybersecurity activities necessary to achieve security objectives."
TheCMMC Assessment Process (CAP) Guideoutlines how assessors verify the implementation of these practices during an assessment.
TheNIST SP 800-171A Guideprovidesassessment objectivesfor each practice to ensure they are implemented effectively.
Comparison with Other Answer Choices:
A. A business transaction? Incorrect. CMMC practices focus on cybersecurity activities, not financial or operational transactions.
B. A condition arrived at by experience or exercise? Incorrect. While practices evolve over time, they are defined activities, not just experience-based conditions.
C. A series of changes taking place in a defined manner? Incorrect. A practice is a set of security actions, not just a process of change.
Conclusion:
ACMMC practicerefers to specificcybersecurity activities performed to meet defined CMMC objectives. This makesOption Dthe correct answer.
A Lead Assessor is ensuring all actions have been completed to conclude a Level 2 Assessment. The final Assessment Results Package has been properly reviewed and is ready to be uploaded. What other materials is the Lead Assessor responsible for maintaining and protecting?
Any additional notes and information from the Assessment
A final assessment plan, and a Quality Control report from C3PAO
A final assessment plan, and a letter from the Lead Assessor explaining the process
A final assessment plan, a letter from the Lead Assessor explaining the results, and a Quality Control report from C3PAO
The Lead Assessor is responsible for protecting and maintaining all assessment records, notes, and information gathered during the assessment process. This includes working papers and supplemental documentation that may be needed for auditability or dispute resolution.
Supporting Extracts from Official Content:
CAP v2.0, Post-Assessment Responsibilities (§3.17): “The Lead Assessor must ensure that all assessment artifacts, notes, and information are archived or disposed of in accordance with C3PAO policy.”
Why Option A is Correct:
The CAP specifies that notes and information from the assessment must be preserved or disposed of according to policy.
Options B, C, and D list items not required in the CAP. The “letter” and “quality control report” are not part of the Lead Assessor’s required maintained materials.
References (Official CMMC v2.0 Content):
CMMC Assessment Process (CAP) v2.0, Phase 3 Post-Assessment (§3.17).
===========
Which entity specifies the required CMMC Level in Requests for Information and Requests for Proposals?
DoD
NARA
NIST
Department of Homeland Security
Step 1: Understanding Who Specifies CMMC Levels
TheU.S. Department of Defense (DoD)determines the requiredCMMC Levelbased on thesensitivity of the information involved in a contract.
The required CMMC Level isspecified in Requests for Information (RFIs) and Requests for Proposals (RFPs).
The practices in CMMC Level 2 consists of the security requirements specified in:
NISTSP 800-53.
NISTSP 800-171.
48 CFR 52.204-21.
DFARS 252.204-7012.
The Cybersecurity Maturity Model Certification (CMMC) Level 2 is designed to ensure that organizations can adequately protect Controlled Unclassified Information (CUI). To achieve this, CMMC Level 2 incorporates specific security requirements.
Step-by-Step Explanation:
Alignment with NIST SP 800-171:
CMMC Level 2 aligns directly with the security requirements outlined in the National Institute of Standards and Technology Special Publication 800-171 (NIST SP 800-171). This publication, titled "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations," provides a comprehensive framework for safeguarding CUI.
Incorporation of Security Requirements:
The practices required for CMMC Level 2 certification encompass all 110 security requirements specified in NIST SP 800-171. These requirements are organized into 14 families, each addressing different aspects of cybersecurity, such as access control, incident response, and risk assessment.
Purpose of Alignment:
By integrating the NIST SP 800-171 requirements, CMMC Level 2 aims to standardize the implementation of cybersecurity practices across organizations handling CUI, ensuring a consistent and robust approach to protecting sensitive information.
A CCP is on their first assessment for CMMC Level 2 with an Assessment Team and is reviewing the CMMC Assessment Process to understand their responsibilities. Which method gathers information from the subject matter experts to facilitate understanding and achieve clarification?
Test
Examine
Interview
Assessment
Understanding CMMC Assessment Methods
TheCMMC Assessment Process (CAP)definesthree primary assessment methodsused to verify compliance with cybersecurity practices:
Examine– Reviewing documents, policies, configurations, and logs.
Interview– Engaging with subject matter experts (SMEs) to clarify processes and verify implementation.
Test– Observing technical implementations, such as system configurations and security measures.
Since the question asks for a method thatgathers information from SMEs to facilitate understanding and achieve clarification, the correct method isInterview.
Why "Interview" is Correct?
?Interviewsare specifically designed togather information from SMEsto confirm understanding and clarify security processes.
?TheCMMC Assessment Guiderequires assessors tointerview key personnelresponsible for cybersecurity practices.
?Examine (Option B)andTest (Option A)are also valid assessment methods, but they donot focus on gathering insights directly from SMEs.
Breakdown of Answer Choices
Option
Description
Correct?
A. Test
?Incorrect–This method involvestechnical verification, not gathering SME insights.
B. Examine
?Incorrect–This method focuses ondocument review, not SME interaction.
C. Interview
?Correct – The method used to gather information from SMEs and achieve clarification.
D. Assessment
?Incorrect–This is a general term,not a specific assessment method.
Official References from CMMC 2.0 Documentation
CMMC Assessment Process Guide (CAP)– DefinesInterviewas the method for obtaining information from SMEs.
Final Verification and Conclusion
The correct answer isC. Interview, as this methodgathers insights from subject matter expertsto verify cybersecurity implementations.
Which standard of assessment do all C3PAO organizations execute an assessment methodology based on?
ISO 27001
NISTSP800-53A
CMMC Assessment Process
Government Accountability Office Yellow Book
Understanding the C3PAO Assessment Methodology
ACertified Third-Party Assessment Organization (C3PAO)is an entity authorized by theCMMC Accreditation Body (CMMC-AB)to conduct officialCMMC Level 2 assessmentsfor organizations seeking certification.
Key Requirement: CMMC Assessment Process (CAP)
C3PAOs must follow theCMMC Assessment Process (CAP), which outlines:
?Theassessment methodologyfor evaluating compliance.
?Evidence collectionprocedures (interviews, artifacts, testing).
?Assessment scoring and reportingrequirements.
?Guidance for assessorson executing standardized assessments.
Why "CMMC Assessment Process" is Correct?
ISO 27001 (Option A)is an international standard forinformation security managementbut isnot the basis for CMMC assessments.
NIST SP 800-53A (Option B)providessecurity control assessments for federal systems, but CMMC assessments arebased on NIST SP 800-171.
GAO Yellow Book (Option D)is agovernment auditing standardused forfinancial and performance audits, not cybersecurity assessments.
CMMC Assessment Process (CAP) (Option C) is the correct answerbecause it defines how C3PAOs conduct CMMC assessments.
Official References from CMMC 2.0 Documentation
CMMC Assessment Process Guide (CAP)– GovernsC3PAO assessment execution.
CMMC 2.0 Model Documentation– RequiresC3PAOs to follow CAP proceduresfor assessments.
Final Verification and Conclusion
The correct answer isC. CMMC Assessment Process, as it is theofficial methodology all C3PAOs must follow when conducting CMMC assessments.
CMMC scoping covers the CUI environment encompassing the systems, applications, and services that focus on where CUI is:
received and transferred.
stored, processed, and transmitted.
entered, edited, manipulated, printed, and viewed.
located on electronic media, on system component memory, and on paper.
TheCMMC Scoping Guide for Level 2outlines thatCUI assetsinclude systems, applications, and services thatstore, process, or transmitControlled Unclassified Information (CUI). These are the three core functions that defineCUI handlingwithin anOrganization Seeking Certification (OSC).
Step-by-Step Breakdown:
?1. CUI Assets Defined in CMMC
Stored:CUI is saved on hard drives, cloud storage, or databases.
Processed:CUI is actively used, modified, or analyzed by applications and users.
Transmitted:CUI is sent between systems via email, file transfers, or network communication.
?2. Why the Other Answer Choices Are Incorrect:
(A) Received and transferred?
Whilereceiving and transferring CUIis part of handling CUI, it does not fully cover all CUI asset responsibilities.
(C) Entered, edited, manipulated, printed, and viewed?
These arespecific actionswithinprocessingbut do not coverstorage or transmission, which are also required for CMMC scoping.
(D) Located on electronic media, on system component memory, and on paper?
While CUI can exist inelectronic and physical forms, CMMC scoping focuses onhow CUI is actively managed (stored, processed, transmitted)rather than where it physically resides.
Final Validation from CMMC Documentation:
TheCMMC Level 2 Scoping Guideconfirms thatCUI Assets are categorized based on their role in storing, processing, or transmitting CUI.
NIST SP 800-171also defines these three functions as key components of CUI protection.
Within the CMMC Ecosystem which organization ultimately will manage and oversee the training, testing, authorization, and certification of candidate assessors and instructors?
DoD OUSD
DIB Collaborative Information Sharing Environment
Committee on National Security Systems Instructions
CMMC Assessors and Instructors Certification Organization
Understanding the Role of CAICO in the CMMC Ecosystem
TheCMMC Ecosystemconsists of multiple organizations that manage, implement, and oversee different aspects of theCybersecurity Maturity Model Certification (CMMC)program.
One of the key organizations is theCMMC Assessors and Instructors Certification Organization (CAICO), which is responsible for:
Training and certifying assessors and instructors.
Managing testing, authorization, and certificationfor CMMC professionals.
Ensuring assessors meet qualification and compliance standards.
Why Option D (CAICO) is Correct
TheCAICO is explicitly taskedwith thetraining, testing, authorization, and certification of candidate assessors and instructors.
Option A (DoD OUSD)is incorrect because theDoD Office of the Under Secretary of Defense(OUSD) provides policy oversight butdoes not handle certification of assessors.
Option B (DIB Collaborative Information Sharing Environment)is incorrect because theDIB CISfocuses on information sharing within the Defense Industrial Base, not assessor certification.
Option C (Committee on National Security Systems Instructions)is incorrect because CNSSI provides security standards butdoes not manage assessor training or certification.
Official CMMC Documentation References
CMMC Ecosystem Overview – Role of the CAICO
CMMC Assessment Process (CAP) Guide – Assessor Certification and Training
Final Verification
SinceCAICO is responsible for training, testing, and certifying CMMC assessors and instructors, the correct answer isOption D: CMMC Assessors and Instructors Certification Organization.
In late September. CA.L2-3.12.1: Periodically assess the security controls in organizational systems to determine if the controls are effective in their application is assessed. Procedure specifies that a security control assessment shall be conducted quarterly. The Lead Assessor is only provided the first quarter assessment report because the person conducting the second quarter's assessment is currently out of the office and will return to the office in two hours. Based on this information, the Lead Assessor should determine that the evidence is;
sufficient, and rate the audit finding as MET
insufficient, and rate the audit finding as NOT MET.
sufficient, and re-rate the audit finding after a quarter two assessment report is examined.
insufficient, and re-rate the audit finding after a quarter two assessment report is examined.
Control Reference: CA.L2-3.12.1
CA.L2-3.12.1:"Periodically assess the security controls in organizational systems to determine if the controls are effective in their application."
This control is derived fromNIST SP 800-171, Requirement 3.12.1, which mandates organizations to performregular security control assessmentsto ensure compliance and effectiveness.
Assessment Criteria & Justification for the Correct Answer:
Evidence Review & Assessment Timeline:
The organization's procedureexplicitly statesthat security control assessments must be conductedquarterly(every three months).
Since the Lead Assessor only has access to thefirst-quarter report, the second-quarter report is missing at the time of assessment.
CMMC Audit Requirements:
For an assessor to rate a control asMET, sufficient evidence must bereadily availableat the time of evaluation.
Since the second-quarter report is missingat the time of assessment, the Lead Assessorcannot verify compliancewith the organization's own stated frequency of assessment.
Why the Answer is NOT A, C, or D:
A (Sufficient, MET)?Incorrect: The control assessment frequency is quarterly, but the evidence for Q2 is not available. Compliance cannot be confirmed.
C (Sufficient, and re-rate later)?Incorrect: If evidence is not available during the audit, the controlcannot be rated as MET initially. There is no provision in CMMC 2.0 to "conditionally" pass a control pending future evidence.
D (Insufficient, but re-rate later)?Incorrect: Once a control is ratedNOT MET, it staysNOT METuntil a re-assessment is conducted in a new audit cycle. The assessordoes not adjust ratings retroactivelybased on future evidence.
Official CMMC 2.0 References Supporting the Answer:
CMMC Assessment Process (CAP) Guide (2023):
"For a control to be rated as MET, the assessed organization must provide sufficient evidence at the time of the assessment."
"If evidence is missing or incomplete, the finding shall be rated as NOT MET."
NIST SP 800-171A (Security Requirement Assessment Guide):
"Evidence must be current, relevant, and sufficient to demonstrate compliance with stated periodicity requirements."
Since the procedure mandatesquarterly assessments, missing evidence means compliancecannot be validated.
DoD CMMC Scoping Guidance:
"Assessors shall base their determination on the evidence provided at the time of assessment. If required evidence is not available, the control shall be rated as NOT MET."
Final Conclusion:
Thecorrect answer is Bbecause the required evidence (the second-quarter report) is not availableat the time of assessment, making itinsufficientto validate compliance. The Lead Assessormust rate the control as NOT METin accordance with CMMC 2.0 assessment rules.
A C3PAO is near completion of a Level 2 Assessment for an OSC. The CMMC Findings Brief and CMMC Assessment Results documents have been developed. The Final Recommended Assessment Results are being generated. When generating these results, what MUST be included?
An updated Assessment Plan
Recorded and final updated Daily Checkpoint
Fully executed CMMC Assessment contract between the C3PAO and the OSC
Review documentation for the CMMC Quality Assurance Professional (CQAP)
According to the CMMC Assessment Process (CAP), specifically within the Phase 4: Reporting Results requirements, a C3PAO must ensure that every assessment package undergoes a rigorous quality review before it is finalized and submitted to the Department of Defense (DoD).
The Role of the CQAP: The CMMC Quality Assurance Professional (CQAP) is a designated role within a C3PAO responsible for verifying that the assessment was conducted in accordance with the CAP and that the evidence collected (the "Artifacts") supports the findings (Met/Not Met).
Mandatory Inclusion: When generating the Final Recommended Assessment Results, the package is not considered complete or valid without the formal review documentation from the CQAP. This documentation serves as the "stamp of approval" that the internal Quality Management System (QMS) of the C3PAO has validated the assessment team's work.
Why other options are incorrect:
Option A: While the Assessment Plan is a required document during the planning phase, it is an input to the process, not a mandatory component of theFinal Resultsgeneration in the same way quality validation is.
Option B: Daily Checkpoints are administrative tools used during the "Conduct Assessment" phase to keep the OSC informed. While they are part of the assessment record, they are not a mandatory technical component of the final results package.
Option C: The contract is a legal/business requirement handled during the "Plan and Prepare" phase; it is not included in the technical assessment results uploaded to the DoD.
Reference Documents:
CMMC Assessment Process (CAP) v1.0: Section 4.2 (Finalize Assessment Report) and Section 4.3 (C3PAO Quality Review).
C3PAO Authorization Requirements: Specifies the requirement for a Quality Assurance (QA) function to review all assessment outputs to ensure consistency and integrity across the ecosystem.
Which training is a CCI authorized to deliver through an approved CMMC LTP?
CMMC-AB approved training
DoD DFARS and CMMC-AB approved training
NARA CUI training and CMMC-AB approved training
DoD DFARS, NARA CUI, and CMMC-AB approved training
A Certified CMMC Instructor (CCI) is only authorized to deliver CMMC-AB (now The Cyber AB) approved training courses through a Licensed Training Provider (LTP). CCI instructors do not deliver DFARS or NARA CUI training under CMMC authorization—only formally approved CMMC courses.
Supporting Extracts from Official Content:
CMMC Ecosystem Roles: “CCIs are authorized to deliver CMMC-AB approved training courses through an LTP.”
Why Option A is Correct:
CCIs teach only CMMC-AB approved training.
Options B, C, and D include external trainings (DFARS or NARA CUI) that are not within the CCI’s scope.
References (Official CMMC v2.0 Content):
CMMC Ecosystem documentation – Roles and Responsibilities of LTPs and CCIs.
===========
The Audit and Accountability (AU) domain has practices in:
Level 1.
Level 2.
Levels 1 and 2.
Levels 1 and 3.
TheAudit and Accountability (AU) domainis one of the14 familiesof security requirements inNIST SP 800-171 Rev. 2, which is fully adopted byCMMC 2.0 Level 2.
Analysis of the Given Options:
A. Level 1?Incorrect
CMMCLevel 1only includes17 basic FAR 52.204-21 safeguarding requirementsand does not coverAudit and Accountability (AU)practices.
B. Level 2?Correct
TheAU domain is required at Level 2, which aligns withNIST SP 800-171.
CMMC 2.0 Level 2includes110 security controls, among whichAU-related controlsfocus on logging, monitoring, and accountability.
C. Levels 1 and 2?Incorrect
Level 1 does not requireaudit and accountability practices.
D. Levels 1 and 3?Incorrect
CMMC 2.0 only has Levels 1, 2, and 3, andAU is present in Level 2, making Level 3 irrelevant for this answer.
Official References Supporting the Correct Answer:
NIST SP 800-171 Rev. 2 (Audit and Accountability - Family 3.3)
TheAU domainconsists of security controls3.3.1 – 3.3.8, focusing on audit log generation, retention, and accountability.
CMMC 2.0 Level 2 Practices (Aligned with NIST SP 800-171)
AU practices (Audit and Accountability) are only required at Level 2.
Conclusion:
TheAU domain applies only to CMMC 2.0 Level 2, making the correct answer:
?B. Level 2.
A defense contractor needs to share FCI with a subcontractor and sends this data in an email. The email system involved in this process is being used to:
manage FCI.
process FCI.
transmit FCI.
generate FCI
Federal Contract Information (FCI) is defined in FAR 52.204-21 as information provided by or generated for the government under contract but not intended for public release. Under CMMC 2.0, organizations handling FCI must implement FAR 52.204-21 Basic Safeguarding Requirements, ensuring proper protection in processing, storing, and transmitting FCI.
Analyzing the Given Options
The question involves an email system that is used to send FCI to a subcontractor. Let’s break down the possible answers:
A. Manage FCI ? Incorrect
Managing FCI involves activities like organizing, storing, and maintaining access to FCI. Sending an email does not fall under management; it is an act of transmission.
B. Process FCI ? Incorrect
Processing refers to actively using FCI for operational or analytical purposes, such as analyzing, modifying, or computing data. Simply sending an email does not constitute processing.
C. Transmit FCI ? Correct
Transmission refers to the act of sending FCI from one entity to another. Since the contractor is sending FCI via email, this falls under transmitting the data.
Which phase of the CMMC Assessment Process includes the task to identify, obtain inventory, and verify evidence?
Phase 1: Plan and Prepare Assessment
Phase 2: Conduct Assessment
Phase 3: Report Recommended Assessment Results
Phase 4: Remediation of Outstanding Assessment Issues
Understanding the CMMC Assessment Process
TheCMMC Assessment Process (CAP)consists offour phases, each with specific tasks and objectives.
Phase 1: Plan and Prepare Assessment– Planning, scheduling, and preparing for the assessment.
Phase 2: Conduct Assessment–Gathering and verifying evidence, conducting interviews, and evaluating compliance.
Phase 3: Report Recommended Assessment Results– Documenting findings and reporting results.
Phase 4: Remediation of Outstanding Assessment Issues– Allowing the organization to address any deficiencies.
Why "Phase 2: Conduct Assessment" is Correct?
DuringPhase 2: Conduct Assessment, theAssessment Teamperforms key activities, including:
?Identifying required evidencefor compliance verification.
?Obtaining and reviewing artifacts(e.g., security policies, configurations, logs).
?Verifying the sufficiency of evidenceagainst CMMC practice requirements.
?Interviewing key personneland observing cybersecurity implementations.
Since the question specifically mentions"identify, obtain inventory, and verify evidence,"this task directly falls underPhase 2: Conduct Assessment.
Breakdown of Answer Choices
Option
Description
Correct?
A. Phase 1: Plan and Prepare Assessment
?Incorrect–This phase focuses onscheduling, logistics, and planning, not evidence collection.
B. Phase 2: Conduct Assessment
?Correct – This phase involves gathering, verifying, and reviewing evidence.
C. Phase 3: Report Recommended Assessment Results
?Incorrect–This phasedocumentsresults but doesnotcollect evidence.
D. Phase 4: Remediation of Outstanding Assessment Issues
?Incorrect–This phase focuses oncorrective actions, not evidence collection.
Official References from CMMC 2.0 Documentation
CMMC Assessment Process Guide (CAP)–Phase 2: Conduct Assessmentexplicitly includes tasks such asgathering and verifying evidence.
Final Verification and Conclusion
The correct answer isB. Phase 2: Conduct Assessment, as this phase includesidentifying, obtaining, and verifying evidence, which is critical for determining CMMC compliance.
During the planning phase of the Assessment Process. C3PAO staff are reviewing the various entities associated with an OSC that has requested a CMMC Level 2 Assessment. Which term describes the people, processes, and technology external to the HQ Organization that participate in the assessment but will not receive a CMMC Level unless an enterprise Assessment is conducted?
Host Unit
Organization
Coordinating Unit
Supporting Organization/Unit
In the context of the Cybersecurity Maturity Model Certification (CMMC) Assessment Process, understanding the roles of various entities associated with an Organization Seeking Certification (OSC) is crucial during the planning phase. When a Certified Third-Party Assessment Organization (C3PAO) staff reviews these entities for a CMMC Level 2 Assessment, it's essential to distinguish between internal components and external participants.
Step-by-Step Explanation:
Definition of the HQ Organization:
The HQ Organization refers to the entire legal entity delivering services under the terms of a Department of Defense (DoD) contract. This entity is responsible for ensuring compliance with CMMC requirements.
Identification of External Entities:
External entities encompass people, processes, and technology that are not part of the HQ Organization but support its operations. These entities participate in the assessment process due to their involvement in handling Controlled Unclassified Information (CUI) or Federal Contract Information (FCI) related to the DoD contract.
Role of Supporting Organizations/Units:
According to the CMMC Assessment Process documentation, Supporting Organizations are defined as "the people, procedures, and technology external to the HQ Organization that support the Host Unit." These external entities are integral to the operations of the Host Unit but are not encompassed within the HQ Organization's immediate structure.
Assessment Implications:
While Supporting Organizations/Units play a vital role in supporting the Host Unit, they do not receive a separate CMMC Level certification unless an enterprise assessment is conducted. In such cases, the assessment would encompass both the HQ Organization and its Supporting Organizations to ensure comprehensive compliance across all associated entities.
Which statement is NOT a measure to determine if collected evidence is sufficient?
Evidence covers the sampled organization
Evidence is not required if the practice is ISO certified
Evidence covers the model scope of the Assessment (Target CMMC Level)
Evidence corresponds to the sampled organization in the evidence collection approach
The CMMC Assessment Process (CAP) requires that sufficient evidence must:
Cover the sampled organization,
Cover the defined model scope of the assessment (Target CMMC Level), and
Correspond to the evidence collection approach.
Evidence is always required, even if the organization holds other certifications such as ISO. External certifications cannot replace CMMC evidence requirements. Thus, the statement that “Evidence is not required if the practice is ISO certified” is not valid.
Reference Documents:
CMMC Assessment Process (CAP), v1.0
The Lead Assessor is presenting the Final Findings Presentation to the OSC. During the presentation, the Assessment Sponsor and OSC staff inform the assessor that they do not agree with the assessment results. Who has the final authority for the assessment results?
C3PAO
CMMC-AB
Assessment Team
Assessment Sponsor
Who Has the Final Authority Over Assessment Results?
During aCMMC Level 2 assessment, theCertified Third-Party Assessment Organization (C3PAO)is responsible for conducting and finalizing the assessment results.
Key Responsibilities of a C3PAO
?Leads the assessmentand ensures it follows the CMMC Assessment Process (CAP).
?Validates compliancewith CMMC Level 2 requirements based onNIST SP 800-171controls.
?Finalizes the assessment resultsand submits them to theCMMC-ABand theDoD.
?Handles disagreementsfrom the OSC but hasfinal decision-making authorityon results.
Why "C3PAO" is Correct?
The C3PAO has final authority over the assessment resultsafter considering all evidence and findings.
TheCMMC-AB (Option B) does not finalize assessments—it accredits C3PAOs and manages the certification ecosystem.
TheAssessment Team (Option C) supports the C3PAO but does not have final decision authority.
TheAssessment Sponsor (Option D) is a representative from the OSC and does not control the results.
Breakdown of Answer Choices
Option
Description
Correct?
A. C3PAO
?Correct – C3PAOs finalize and submit assessment results.
B. CMMC-AB
?Incorrect–The CMMC-AB accredits C3PAOs but doesnot finalize results.
C. Assessment Team
?Incorrect–They conduct the assessment, but the C3PAO makes final decisions.
D. Assessment Sponsor
?Incorrect–This is arepresentative of the OSC, not the assessment authority.
Official References from CMMC 2.0 Documentation
CMMC Assessment Process Guide (CAP)– DefinesC3PAO authorityover final assessment results.
Final Verification and Conclusion
The correct answer isA. C3PAO, as theC3PAO has final decision-making authority over CMMC assessment results.
The practices in CMMC Level 2 consist of the security requirements specified in:
NIST SP 800-53
NIST SP 800-171
48 CFR 52.204-21
DFARS 252.204-7012
CMMC Level 2 requires full implementation of the 110 security requirements specified in NIST SP 800-171 Rev. 2, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. These practices form the foundation for safeguarding CUI across defense contractor systems.
NIST SP 800-53 is a broader catalog of security controls for federal systems, not specific to CUI in the defense contractor environment.
48 CFR 52.204-21 establishes basic safeguarding requirements for Federal Contract Information (FCI) and corresponds to CMMC Level 1.
DFARS 252.204-7012 defines safeguarding and incident reporting obligations but does not enumerate the specific security practices required.
Thus, Level 2 practices are aligned to NIST SP 800-171.
Reference Documents:
CMMC Model v2.0 Overview, December 2021
NIST SP 800-171 Rev. 2
When assessing SI.L1-3.14.2: Provide protection from malicious code at appropriate locations within organizational information systems, evidence shows that all of the OSC's workstations and servers have antivirus software installed for malicious code protection. A centralized console for the antivirus software management is in place and records show that all devices have received the most updated antivirus patterns. What is the BEST determination that the Lead Assessor should reach regarding the evidence?
It is sufficient, and the audit finding can be rated as MET.
It is insufficient, and the audit finding can be rated NOT MET.
It is sufficient, and the Lead Assessor should seek more evidence.
It is insufficient, and the Lead Assessor should seek more evidence.
Understanding SI.L1-3.14.2: Provide Protection from Malicious Code
The CMMC Level 1 practiceSI.L1-3.14.2is based onNIST SP 800-171 Requirement 3.14.2, which requires organizations to:
Implement malicious code protection(e.g., antivirus, endpoint security software).
Ensure coverage across all appropriate locations(e.g., workstations, servers, network entry points).
Keep protection mechanisms updated(e.g., regular signature updates, policy enforcement).
Assessment Criteria for a "MET" Rating:
To determine whether the practice isMET, the Lead Assessor must confirm that:
?Antivirus or endpoint protection software is installedon all workstations and servers.
?The solution is centrally managed, ensuring consistent policy enforcement.
?Signature updates are current, meaning systems are protected against new threats.
?Logs or reports demonstrate active monitoring and updates.
Why is the Correct Answer "A. It is sufficient, and the audit finding can be rated as MET"?
The provided evidenceconfirms all necessary requirementsfor SI.L1-3.14.2:
?All workstations and servers have antivirus installed?Meets installation requirement.
?A centralized management console is in place?Ensures consistent enforcement.
?Records show antivirus signatures are up to date?Confirms system protection is current.
Because the evidencemeets the requirement, the practice should berated as MET.
Why Are the Other Answers Incorrect?
B. It is insufficient, and the audit finding can be rated NOT MET ? Incorrect
The evidence providedmeets all necessary requirements, so the practiceshould not be rated as NOT MET.
C. It is sufficient, and the Lead Assessor should seek more evidence ? Incorrect
Ifadequate evidence already exists,additional evidence is unnecessary.
D. It is insufficient, and the Lead Assessor should seek more evidence ? Incorrect
The evidence providedmeets the control requirements, making itsufficient.
CMMC 2.0 References Supporting This Answer:
CMMC Assessment Process (CAP) Document
Specifies that a practice can be marked asMET if sufficient evidence is provided.
NIST SP 800-171 (Requirement 3.14.2)
Defines the standard formalicious code protection, which ismet by antivirus with active updates.
CMMC 2.0 Level 1 (Foundational) Requirements
Clarifies that basic cybersecurity measures likeantivirus installation and updatesmeet compliance forSI.L1-3.14.2.
Final Answer:
?A. It is sufficient, and the audit finding can be rated as MET.
Which phase of the CMMC Assessment Process includes developing the assessment plan?
Phase 1
Phase 2
Phase 3
Phase 4
Understanding the Phases of the CMMC Assessment Process
TheCMMC Assessment Process (CAP)consists of multiple phases, with each phase focusing on a different aspect of the assessment.Developing the assessment planoccurs inPhase 1, which is thePre-Assessment Phase.
Key Activities in Phase 1 – Pre-Assessment Phase
Engagement Agreement: TheOSC (Organization Seeking Certification)and theCertified Third-Party Assessment Organization (C3PAO)formalize the assessment contract.
Developing the Assessment Plan: TheLead Assessorand the assessment team create anAssessment Plan, which outlines:
Scope of the assessment
CMMC Level requirements
Assessment methodology
Timeline and logistics
Initial Data Collection: Review of system documentation, policies, and relevant security controls.
Why is the Correct Answer "Phase 1" (A)?
A. Phase 1 ? Correct
Phase 1 is where the assessment plan is developed.
It ensuresclarity on scope, methodology, and logistics before the assessment begins.
B. Phase 2 ? Incorrect
Phase 2 is theAssessment Conduct Phase, where assessorsexecutethe plan by examining evidence and interviewing personnel.
C. Phase 3 ? Incorrect
Phase 3 is thePost-Assessment Phase, which involvesfinalizing findings and submitting reports, not developing the plan.
D. Phase (Incomplete Answer) ? Incorrect
The question requires a specific phase, and the correct one isPhase 1.
CMMC 2.0 References Supporting this Answer:
CMMC Assessment Process (CAP) Document
DefinesPhase 1as the stage where the assessment plan is developed.
CMMC Accreditation Body (CMMC-AB) Guidelines
Specifies thatplanning and pre-assessment activities occur in Phase 1.
CMMC 2.0 Certification Workflow
Outlines the assessment planning process as part of theinitial engagementbetween theC3PAO and the OSC.
During a Level 1 Self-Assessment, a smart thermostat was identified. It is connected to the Internet on the OSC's WiFi network. What type of asset is this?
FCI Asset
CUI Asset
In-scope Asset
Specialized Asset
Understanding Asset Categorization in CMMC 2.0
InCMMC 2.0, assets are categorized into different types based on their function, connectivity, and whether they process, store, or transmitFederal Contract Information (FCI) or Controlled Unclassified Information (CUI).
Why "D. Specialized Asset" is Correct?
TheCMMC 2.0 Scoping GuidedefinesSpecialized Assetsas assetsthat do not fit traditional IT classificationsbut still exist within the organizational environment.
Asmart thermostatis anInternet of Things (IoT) device, which falls underSpecialized Assetsas defined in CMMC.
Why Other Answers Are Incorrect?
A. FCI Asset (Incorrect)
FCI Assets process, store, or transmit Federal Contract Information, which asmart thermostat does not.
B. CUI Asset (Incorrect)
CUI Assets handle Controlled Unclassified Information, and athermostat does not process CUI.
C. In-scope Asset (Incorrect)
In-scope Assets include FCI and CUI assets, which asmart thermostat does not qualify as.
Conclusion
The correct answer isD. Specialized Asset, as asmart thermostat is an IoT device, which falls into theSpecialized Assetcategory.
An OSC lead has provided company information, identified that they are seeking CMMC Level 2, stated that they handle FCI. identified stakeholders, and provided assessment logistics. The OSC has provided the company's cyber hygiene practices that are posted on every workstation, visitor logs, and screenshots of the configuration of their FedRAMP-approved applications. The OSC has not won any DoD government contracts yet but is working on two proposals Based on this information, which statement BEST describes the CMMC Level 2 Assessment requirements?
Ready because there is no need to certify this company until after they win a DoD contract.
Not ready because the OSC is not on contract because they do not know the scope of FCI protection required by the contract.
Not ready because the OSC still lacks artifacts that prove they have implemented all the CMMC Level 2 Assessment requirements.
Ready because all DoD contractors are required to achieve CMMC Level 2; therefore, they are being proactive in seeking certification.
CMMC Level 2 Readiness and Certification Requirements
CMMCLevel 2is required forOrganizations Seeking Certification (OSCs) that handle Controlled Unclassified Information (CUI)and aligns withNIST SP 800-171's 110 security controls.
Key Readiness Indicators for a Level 2 Assessment:
The OSC must have implemented all 110 security practices from NIST SP 800-171.
Documented and validated cybersecurity policies and procedures must exist.
The OSC must be prepared to provide objective evidence (artifacts) proving compliance.
Why the OSC in the Question is Not Ready:
They have not won a DoD contract yet? This means they do not yet have a contractually definedCUI environment, which is the foundation for defining their security scope.
They have only provided FCI-related artifacts(e.g., visitor logs, workstation policies, FedRAMP configurations).
Lack of full documentation of CMMC Level 2 controls? The assessment requiresevidence for all 110 security practices(e.g., system security plans, incident response records, security awareness training documentation).
Clarification of Incorrect Options:
A. "Ready because there is no need to certify this company until after they win a DoD contract."
Incorrect? Some organizationsseek certification proactivelybefore winning contracts. However, readiness depends on implementingall 110 required controls, not contract status alone.
B. "Not ready because the OSC is not on contract because they do not know the scope of FCI protection required by the contract."
Incorrect? CMMC Level 2focuses on CUI, not just FCI. While FCI protection is important, the assessment’s focus is onCUI security requirements, which arenot fully addressed by the provided artifacts.
D. "Ready because all DoD contractors are required to achieve CMMC Level 2; therefore, they are being proactive in seeking certification."
Incorrect? While it is commendable that the OSC is being proactive,readiness is based on full compliance with NIST SP 800-171, not just intent.
An organization that manufactures night vision cameras is looking for help to address the gaps identified in physical access control systems. Which certified individual should they approach for implementation support?
CCA of the C3PAO performing the assessment
RP of an organization not part of the assessment
Practitioner of the organization performing the assessment LTP
DoD Contract Official of the organization performing the assessment
Anorganization seeking helpto address security gaps—such asphysical access control deficiencies—needs acertified professional who can provide implementation supportwithoutbeing involved in the actual CMMC assessment.
Role of a Registered Practitioner (RP)
A Registered Practitioner (RP)is a CMMC-certified individualwho provides consulting and implementation supportto organizations butdoes not perform assessments.
RPs work independently from C3PAOsand canassist in fixing gapsin security controlsbeforeorafteran assessment.
Since RPs are not assessors, they can provide direct remediation supportwithout any conflict of interest.
Why "B. RP of an Organization Not Part of the Assessment" is Correct?
The OSC needs assistance in implementing security controls(not assessment).
An RP is trained and authorized to provide remediation and advisory services.
Conflict of interest rules prevent the assessing C3PAO from providing implementation support.
Why Other Answers Are Incorrect?
A. CCA of the C3PAO performing the assessment (Incorrect)
ACertified CMMC Assessor (CCA)is responsible for conducting the assessmentonly.
TheC3PAO performing the assessment cannot also provide remediationdue to aconflict of interest.
C. Practitioner of the Organization Performing the Assessment LTP (Incorrect)
The assessmentLead Technical Practitioner (LTP)cannot provide remediation support for an OSC they are assessing.
D. DoD Contract Official of the Organization Performing the Assessment (Incorrect)
DoD Contract Officialsoversee contract compliance butdo not provide cybersecurity implementation support.
Conclusion
The correct answer isB. RP of an organization not part of the assessment, asonly independent RPs can assist with remediation and implementation support.
Regarding the Risk Assessment (RA) domain, what should an OSC periodically assess?
Organizational operations, business assets, and employees
Organizational operations, business processes, and employees
Organizational operations, organizational assets, and individuals
Organizational operations, organizational processes, and individuals
TheRisk Assessment (RA) domainaligns withNIST SP 800-171 control family 3.11 (Risk Assessment)and is designed to help organizationsidentify, assess, and manage cybersecurity risksthat could impact their operations.
TheRA.3.144 practice(which is a CMMC Level 2 requirement) explicitly states:
"Periodically assess therisktoorganizational operations (including mission, functions, image, or reputation), organizational assets, and individualsresulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI."
This means that OSCs (Organizations Seeking Certification) should regularly evaluate risks to:
?Organizational operations(e.g., mission, business continuity, functions)
?Organizational assets(e.g., data, IT systems, intellectual property)
?Individuals(e.g., employees, contractors, customers affected by security risks)
Thus, the correct answer isC. Organizational operations, organizational assets, and individuals.
Why the Other Answers Are Incorrect
A. Organizational operations, business assets, and employees
?Incorrect."Business assets"is not the correct terminology used in CMMC/NIST SP 800-171. Instead,"organizational assets"is the proper term.
B. Organizational operations, business processes, and employees
?Incorrect."Business processes"is not a part of the formal risk assessment requirement. The correct scope includesorganizational assetsandindividuals, not just processes.
D. Organizational operations, organizational processes, and individuals
?Incorrect. While processes are important,organizational assetsmust be considered in the assessment, not just processes.
CMMC Official References
CMMC 2.0 Model (Level 2 - RA.3.144)– Specifies that risk assessments must coverorganizational operations, organizational assets, and individuals.
NIST SP 800-171 (3.11.1)– Reinforces the same risk assessment scope.
Thus,option C (Organizational operations, organizational assets, and individuals) is the correct answerbased on official CMMC risk assessment requirements.
Which resource contains authoritative data classifications of CUI?
NARA
CMMC-AB
DoD Contractors FAQ
OSC's privacy policies
The National Archives and Records Administration (NARA) serves as the authoritative body overseeing the Controlled Unclassified Information (CUI) program within the United States federal government. NARA maintains the CUI Registry, which is the definitive resource for all categories, subcategories, and associated markings of CUI. This registry provides comprehensive guidance on the identification and handling of CUI, ensuring standardized practices across federal agencies and their contractors.
The other options are delineated as follows:
CMMC-AB:The Cybersecurity Maturity Model Certification Accreditation Body is responsible for overseeing the CMMC program but does not manage CUI classifications.
DoD Contractors FAQ:While it may offer guidance to Department of Defense contractors, it is not an authoritative source for CUI data classifications.
OSC's privacy policies:An Organization Seeking Certification's internal policies pertain to its own data handling practices and are not authoritative for CUI classifications.
Therefore, for authoritative information on CUI data classifications, the NARA's CUI Registry is the appropriate resource.
An OSC has requested a C3PAO to conduct a Level 2 Assessment. The C3PAO has agreed, and the two organizations have collaborated to develop the Assessment Plan. Who agrees to and signs off on the Assessment Plan?
OSC and Sponsor
OSC and CMMC-AB
Lead Assessor and C3PAO
C3PAO and Assessment Official
Understanding the CMMC Level 2 Assessment Process
When anOrganization Seeking Certification (OSC)engages aCertified Third-Party Assessment Organization (C3PAO)to conduct aCMMC Level 2 Assessment, anAssessment Planis developed to outline the scope, methodology, and logistics of the assessment.
Who Signs Off on the Assessment Plan?
According to theCMMC Assessment Process (CAP) Guide, theAssessment Plan must be formally agreed upon and signed off by:
Lead Assessor– The individual responsible for overseeing the execution of the assessment.
C3PAO (Certified Third-Party Assessment Organization)– The entity conducting the assessment.
Why "C. Lead Assessor and C3PAO" is Correct?
TheLead Assessorensures that theAssessment Plan aligns with CMMC-AB and DoD requirements, including methodology, objectives, and evidence collection.
TheC3PAOprovides organizational approval, confirming that the assessment is conducted according toCMMC-AB rules and contractual agreements.
Why Other Answers Are Incorrect?
A. OSC and Sponsor (Incorrect)
TheOSC (Organization Seeking Certification)is involved in planning but does not sign off on the plan.
Asponsoris not part of the sign-off process in CMMC assessments.
B. OSC and CMMC-AB (Incorrect)
TheOSCdoes not formally approve theAssessment Plan—this responsibility belongs to the assessment team.
TheCMMC-ABdoes not sign off on individualAssessment Plans.
D. C3PAO and Assessment Official (Incorrect)
"Assessment Official" isnot a defined rolein the CMMC assessment process.
TheC3PAOis involved, but it must be theLead Assessorwho signs off, not an unspecified official.
Conclusion
The correct answer isC. Lead Assessor and C3PAO.
TheLead Assessorensures assessment integrity, while theC3PAOprovides official authorization.
A program manager for a defense contractor saves all FCI data relevant to a contract on a flash drive. Why is the flash drive categorized as an FCI Asset ?
It is storing FCI.
It is testing FCI.
It is distributing FCI.
It is properly marked as FCI.
CMMC v2.0 scoping defines “in-scope” assets for Level 1 (FCI protection) based on whether the asset processes, stores, or transmits FCI . The DoD CMMC Assessment Scope – Level 1 (v2.13) states: “Assets in scope … are all assets that **process, store, or transmit Federal Contract Information (FCI).” It then defines these terms. Critically for this question, Store is defined as when “FCI is inactive or at rest on an asset (e.g., located on electronic media…).”
A flash drive is “electronic media.” If the program manager places contract-relevant FCI onto the flash drive, the flash drive is now an asset that stores FCI (FCI at rest). Under the scoping guidance, that alone is enough to classify it as an in-scope FCI asset for Level 1 purposes, meaning it falls within the Level 1 assessment scope and must be protected by applicable Level 1 requirements.
The other answer choices do not align to the scoping definitions. “Testing FCI” (B) is not one of the scope-determining criteria in the Level 1 scoping guide. “Distributing FCI” (C) is not the formal criterion either (the guide uses Transmit , not “distribute”). Finally, being “properly marked” (D) does not determine whether something is in scope; the decisive factor is whether the asset processes, stores, or transmits FCI.
What technical means can an OSC have in place to limit individuals who are authorized to post or process information on publicly accessible systems?
Enable cookies to track who has accessed certain websites.
Ensure procedural documentation is in place on how to access website consoles.
Ensure marketing team trainings are required so that any changes to the website go through proper review.
Enable administrative access roles to those that need them so that only those people can post items to the website.
This question aligns to the CMMC requirement to control information posted or processed on publicly accessible information systems , which appears in the CMMC Model Overview as AC.L1-3.1.22 (Control Public Information) and maps to FAR 52.204-21(b)(1)(iv) and NIST SP 800-171 Rev. 2 / r2 requirement 3.1.22 .
NIST explains that publicly accessible systems are typically those accessible to the public without identification or authentication , and that individuals authorized to post nonpublic information (including CUI/FCI and proprietary information) are designated . It also emphasizes controlling what gets posted and ensuring nonpublic information is not exposed.
The most direct technical way to “limit individuals who are authorized to post or process information” is to implement role-based administrative access (least privilege) to the website/CMS/admin console—granting publish/edit privileges only to approved roles (e.g., “Web Publisher,” “Content Approver”), and keeping all other users read-only or without access to posting functions. This directly enforces the requirement by using access control to restrict who can post/process content on the public system.
Options B and C are helpful procedural/administrative controls , but the question asks for technical means . Option A (cookies) does not control authorization to post; it’s not an access control mechanism. Therefore, D is best.
What is the LAST step when developing an assessment plan for an OSC?
Verify the readiness to conduct the assessment.
Perform certification assessment readiness review.
Update the assessment plan and schedule as needed
Obtain and record commitment to the assessment plan.
Last Step in Developing an Assessment Plan for an OSC
Developing anassessment planinvolves:
Defining the assessment scope(e.g., systems, networks, locations).
Planning test activities(e.g., interviews, evidence review, technical testing).
Verifying the OSC’s readiness(e.g., ensuring required documents are available).
Updating the assessment plan and schedule as needed.
Final Step: Obtaining and recording the OSC’s commitment to the assessment plan.
Why is obtaining commitment the last step?
?Theassessment cannot proceed unless the OSC agrees to the finalized plan.
?This ensuresOSC leadership understands the scope, timeline, and responsibilities.
?TheC3PAO must document this commitmentto formalize the agreement.
Why is the Correct Answer "D. Obtain and record commitment to the assessment plan"?
A. Verify the readiness to conduct the assessment ? Incorrect
Readiness verification happens earlierin the planning process, not as the last step.
B. Perform certification assessment readiness review ? Incorrect
Areadiness review is conducted before finalizing the plan, not at the very end.
C. Update the assessment plan and schedule as needed ? Incorrect
Updating the plan happens before commitment is obtained; it is not the final step.
D. Obtain and record commitment to the assessment plan ? Correct
This is the final step before conducting the assessment. The OSC must formally agree to the plan.
CMMC 2.0 References Supporting This Answer:
CMMC Assessment Process (CAP) Document
States that theOSC must confirm agreement to the assessment plan before execution.
CMMC-AB Guidelines for C3PAOs
Specifies thatfinalizing the assessment plan requires documented commitment from the OSC.
CMMC Assessment Guide
Outlines thatassessments cannot begin without formal approval of the plan.
Final Answer:
?D. Obtain and record commitment to the assessment plan.
3 Months Free Update
3 Months Free Update
3 Months Free Update
TESTED 09 Apr 2026