Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

CMMC-CCP Certified CMMC Professional (CCP) Exam Questions and Answers

Questions 4

Which document is the BEST source for descriptions of each practice or process contained within the various CMMC domains?

Options:

A.

CMMC Glossary

B.

CMMC Appendices

C.

CMMC Assessment Process

D.

CMMC Assessment Guide Levels 1 and 2

Buy Now
Questions 5

While conducting a CMMC Assessment, an individual from the OSC provides documentation to the assessor for review. The documentation states an incident response capability is established and contains information on incident preparation, detection, analysis, containment, recovery, and user response activities. Which CMMC practice is this documentation attesting to?

Options:

A.

IR.L2-3.6.1: Incident Handling

B.

IR.L2-3.6.2: Incident Reporting

C.

IR.L2-3.6.3: Incident Response Testing

D.

IR.L2-3.6.4: Incident Spillage

Buy Now
Questions 6

The Level 1 practice description in CMMC is Foundational. What is the Level 2 practice description?

Options:

A.

Expert

B.

Advanced

C.

Optimizing

D.

Continuously Improved

Buy Now
Questions 7

When are data and documents with legacy markings from or for the DoD required to be re-marked or redacted?

Options:

A.

When under the control of the DoD

B.

When the document is considered secret

C.

When a document is being shared outside of the organization

D.

When a derivative document's original information is not CUI

Buy Now
Questions 8

At which CMMC Level do the Security Assessment (CA) practices begin?

Options:

A.

Level 1

B.

Level 2

C.

Level 3

D.

Level 4

Buy Now
Questions 9

How does the CMMC define a practice?

Options:

A.

A business transaction

B.

A condition arrived at by experience or exercise

C.

A series of changes taking place in a defined manner

D.

An activity or activities performed to meet defined CMMC objectives

Buy Now
Questions 10

When assessing an OSC for CMMC: the Lead Assessor should use the information from the Discussion and Further Discussion sections in each practice because it:

Options:

A.

is normative for an OSC to follow.

B.

contains examples that an OSC must implement.

C.

is mandatory and aligns with FAR Clause 52.204-21.

D.

provides additional information to facilitate the assessment of the practice.

Buy Now
Questions 11

Who makes the final determination of the assessment method used for each practice?

Options:

A.

CCP

B.

osc

C.

Site Manager

D.

Lead Assessor

Buy Now
Questions 12

A CCP is providing consulting services to a company who is an OSC. The CCP is preparing the OSC for a CMMC Level 2 assessment. The company has asked the CCP who is responsible for determining the CMMC Assessment Scope and who validates its CMMC Assessment Scope. How should the CCP respond?

Options:

A.

"The OSC determines the CMMC Assessment Scope, and the CCP validates the CMMC Assessment Scope."

B.

"The OSC determines the CMMC Assessment Scope, and the C3PAO validates the CMMC Assessment Scope."

C.

"The CMMC Lead Assessor determines the CMMC Assessment Scope, and the OSC validates the CMMC Assessment Scope."

D.

"The CMMC C3PAO determines the CMMC Assessment Scope, and the Lead Assessor validates the CMMC Assessment Scope."

Buy Now
Questions 13

An assessment is being completed at a client site that is not far from the Lead Assessor's home office. The client provides a laptop for the duration of the engagement. During a meeting with the network engineers, the Lead Assessor requests information about the network. They respond that they have a significant number of drawings they can provide via their secure cloud storage service. The Lead Assessor returns to their home office and decides to review the documents. What is the BEST way to retrieve the documents?

Options:

A.

Log into the secure cloud storage service to save copies of the documents on both the work and client laptops.

B.

Log into the client VPN from the client laptop and retrieve the documents from the secure cloud storage service.

C.

Log into the client VPN from the assessor's laptop and retrieve the documents from the secure cloud storage service.

D.

Use their home office workstation to retrieve the documents from the secure cloud storage service and save them to a USB stick.

Buy Now
Questions 14

Who is responsible for ensuring that subcontractors have a valid CMMC Certification?

Options:

A.

CMMC-AB

B.

OUSD A&S

C.

DoD agency or client

D.

Contractor organization

Buy Now
Questions 15

When scoping a Level 2 assessment, which document is useful for understanding the process to successfully implement practices required for the various Levels of CMMC?

Options:

A.

NISTSP 800-53

B.

NISTSP 800-88

C.

NISTSP 800-171

D.

NISTSP 800-172

Buy Now
Questions 16

In scoping a CMMC Level 1 Self-Assessment, it is determined that an ESP employee has access to FCI. What is the ESP employee considered?

Options:

A.

In scope

B.

Out of scope

C.

OSC point of contact

D.

Assessment Team Member

Buy Now
Questions 17

An OSC needs to be assessed on RA.L2-3.11.1: Periodically assess the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI. What is in scope for a Level 2 assessment of RA.L2-3.11.1?

Options:

A.

IT systems

B.

Enterprise systems

C.

CUI Marking processes

D.

Processes, people, physical entities, and IT systems in which CUI processed, stored, or transmitted

Buy Now
Questions 18

During a Level 2 Assessment, the OSC has provided an inventory list of all hardware. The list includes servers, workstations, and network devices. Why should this evidence be sufficient for making a scoring determination for AC.L2-3.1.19: Encrypt CUI on mobile devices and mobile computing platforms?

Options:

A.

The inventory list does not specify mobile devices.

B.

The interviewee attested to encrypting all data at rest.

C.

The inventory list does not include Bring Your Own Devices.

D.

The DoD has accepted an alternative safeguarding measure for mobile devices.

Buy Now
Questions 19

During a CMMC readiness review, the OSC proposes that an associated enclave should not be applicable in the scope. Who is responsible for verifying this request?

Options:

A.

CCP

B.

C3PAO

C.

Lead Assessor

D.

Advisory Board

Buy Now
Questions 20

Which term describes the process of granting or denying specific requests to obtain and use information, related information processing services, and enter specific physical facilities?

Options:

A.

Access control

B.

Physical access control

C.

Mandatory access control

D.

Discretionary access control

Buy Now
Questions 21

According to DFARS clause 252.204-7012, who is responsible for determining that Information in a given category should be considered CUI?

Options:

A.

The NARA CUI Executive Agent

B.

The contractor who generated the information

C.

The DoD agency for whom the contractor is performing the work

D.

The military personnel assigned to the contractor for that purpose

Buy Now
Questions 22

Prior to initiating an OSC's CMMC Assessment, the Lead Assessor briefed the team on the most important requirements of the assessment. The assessor also insisted that the same results of the findings summary, practice ratings, and Level recommendations must be submitted to the C3PAO for initial processes and review. After several weeks of assessment, the C3PAO completes the internal review, the recommended results are then submitted through the C3PAO for final quality review and rating approval. Which document stipulates these reporting requirements?

Options:

A.

CMMC Assessment reporting requirements

B.

DFARS 52.204-21 assessment reporting requirements

C.

NISTSP 800-171 Revision 2 assessment reporting requirements

D.

DFARS clause 252.204-7012 assessment reporting requirements

Buy Now
Questions 23

The results package for a Level 2 Assessment is being submitted. What MUST a Final Report. CMMC Assessment Results include?

Options:

A.

Affirmation for each practice or control

B.

Documented rationale for each failed practice

C.

Suggested improvements for each failed practice

D.

Gaps or deltas due to any reciprocity model are recorded as met

Buy Now
Questions 24

Where does the requirement to include a required practice of ensuring that personnel are trained to carry out their assigned information security-related duties and responsibilities FIRST appear?

Options:

A.

Level 1

B.

Level 2

C.

Level 3

D.

All levels

Buy Now
Questions 25

Plan of Action defines the clear goal or objective for the plan. What information is generally NOT a part of a plan of action?

Options:

A.

Completion dates

B.

Milestones to measure progress

C.

Ownership of who is accountable for ensuring plan performance

D.

Budget requirements to implement the plan's remediation actions

Buy Now
Questions 26

A Lead Assessor has been assigned to a CMMC Assessment During the assessment, one of the assessors approaches with a signed policy. There is one signatory, and that person has since left the company. Subsequently, another person was hired into that position but has not signed the document. Is this document valid?

Options:

A.

The signatory is the authority to implement and enforce the policy, and since that person is no longer with the company, the policy is not valid.

B.

More research on the company policy of creating, implementing, and enforcing policies is needed. If the company has a policy identifying the authority as with the position or person, then the policy is valid.

C.

The signatory does not validate or invalidate the policy. For the purpose of this assessment, ensuring that the policy is current and is being implemented by the individuals who are performing the work is sufficient.

D.

The authority to implement and enforce lies with the position, not the person. As long as that position's authority and responsibilities have not been removed from implementing that domain, it is still a valid policy.

Buy Now
Questions 27

According to the Configuration Management (CM) domain, which principle is the basis for defining essential system capabilities?

Options:

A.

Least privilege

B.

Essential concern

C.

Least functionality

D.

Separation of duties

Buy Now
Questions 28

A dedicated local printer is used to print out documents with FCI in an organization. This is considered an FCI Asset Which function BEST describes what the printer does with the FCI?

Options:

A.

Encrypt

B.

Manage

C.

Process

D.

Distribute

Buy Now
Questions 29

A company has a government services division and a commercial services division. The government services division interacts exclusively with federal clients and regularly receives FCI. The commercial services division interacts exclusively with non-federal clients and processes only publicly available information. For this company's CMMC Level 1 Self-Assessment, how should the assets supporting the commercial services division be categorized?

Options:

A.

FCI Assets

B.

Specialized Assets

C.

Out-of-Scope Assets

D.

Operational Technology Assets

Buy Now
Questions 30

Which standard of assessment do all C3PAO organizations execute an assessment methodology based on?

Options:

A.

ISO 27001

B.

NISTSP800-53A

C.

CMMC Assessment Process

D.

Government Accountability Office Yellow Book

Buy Now
Questions 31

A Lead Assessor is performing a CMMC readiness review. The Lead Assessor has already recorded the assessment risk status and the overall assessment feasibility. At MINIMUM, what remaining readiness review criteria should be verified?

Options:

A.

Determine the practice pass/fail results.

B.

Determine the preliminary recommended findings.

C.

Determine the initial model practice ratings and record them.

D.

Determine the logistics. Assessment Team, and the evidence readiness.

Buy Now
Questions 32

Which government agency are DoD contractors required to report breaches of CUI to?

Options:

A.

FBI

B.

NARA

C.

DoD Cyber Crime Center

D.

Under Secretary of Defense for Intelligence and Security

Buy Now
Questions 33

A server is used to store FCI with a cloud provider long-term. What is the server considered?

Options:

A.

In scope, because the cloud provider will be storing the FCI data

B.

Out of scope, because the cloud provider stores the FCI data long-term

C.

In scope, because the cloud provider is required to be CMMC Level 2 certified

D.

Out of scope, because encryption is always used when the cloud provider stores the FCI data

Buy Now
Questions 34

Which statement BEST describes a LTP?

Options:

A.

Creates DoD-licensed training

B.

Instructs a curriculum approved by CMMC-AB

C.

May market itself as a CMMC-AB Licensed Provider for testing

D.

Delivers training using some CMMC body of knowledge objectives

Buy Now
Questions 35

Recording evidence as adequate is defined as the criteria needed to:

Options:

A.

verify, based on an assessment and organizational scope.

B.

verify, based on an assessment and organizational practice.

C.

determine if a given artifact, interview response, demonstration, or test meets the CMMC scope.

D.

determine if a given artifact, interview response, demonstration, or test meets the CMMC practice.

Buy Now
Questions 36

A test or demonstration is being performed for the Assessment Team during an assessment. Which environment MUST the OSC perform this test or demonstration?

Options:

A.

Client

B.

Production

C.

Development

D.

Demonstration

Buy Now
Questions 37

Which term describes assessing the ability of a unit equipped with a system to support its mission while withstanding cyber threat activity representative of an actual adversary?

Options:

A.

Penetration test

B.

Black hat testing

C.

Red cell assessment

D.

Adversarial assessment

Buy Now
Questions 38

The Advanced Level in CMMC will contain Access Control (AC) practices from:

Options:

A.

Level 1

B.

Level 3

C.

Levels 1 and 2

D.

Levels 1, 2, and 3

Buy Now
Questions 39

In many organizations, the protection of FCI includes devices that are used to scan physical documentation into digital form and print physical copies of digital FCI. What technical control can be used to limit multi-function device (MFD) access to only the systems authorized to access the MFD?

Options:

A.

Virtual LAN restrictions

B.

Single administrative account

C.

Documentation showing MFD configuration

D.

Access lists only known to the IT administrator

Buy Now
Questions 40

Which authority leads the CMMC direction, standards, best practices, and knowledge framework for how to map the controls and processes across different Levels that range from basic cyber hygiene to advanced cyber practices?

Options:

A.

NIST

B.

DoD CIO office

C.

Federal CIO office

D.

Defense Federal Acquisition Regulation Council

Buy Now
Questions 41

When are contractors required to achieve a CMMC certificate at the Level specified in the solicitation?

Options:

A.

At the time of award

B.

Upon solicitation submission

C.

Thirty days from the award date

D.

Before the due date of submission

Buy Now
Questions 42

The Assessment Team has completed the assessment and determined the preliminary practice ratings. The preliminary practice ratings must be shared with the OSC prior to being finalized for submission. Based on this information, the assessor should present the preliminary practice ratings:

Options:

A.

During the final Daily Checkpoint

B.

After discussing with the CMMC-AB

C.

Via email after the final Daily Checkpoint

D.

Over the phone after the final Daily Checkpoint

Buy Now
Questions 43

Validation of findings is an iterative process usually performed during the Daily Checkpoints throughout the entire assessment process. As a validation activity, why are the preliminary findings important?

Options:

A.

It allows the OSC to comment and provide additional evidence.

B.

It determines whether the OSC will be rated MET or NOT MET on their assessment.

C.

It confirms that the Assessment Team's findings are right and cannot be changed.

D.

It corroborates the Assessment Team's understanding of the CMMC practices and controls.

Buy Now
Questions 44

The Audit and Accountability (AU) domain has practices in:

Options:

A.

Level 1.

B.

Level 2.

C.

Levels 1 and 2.

D.

Levels 1 and 3.

Buy Now
Questions 45

Regarding the Risk Assessment (RA) domain, what should an OSC periodically assess?

Options:

A.

Organizational operations, business assets, and employees

B.

Organizational operations, business processes, and employees

C.

Organizational operations, organizational assets, and individuals

D.

Organizational operations, organizational processes, and individuals

Buy Now
Questions 46

Which entity requires that organizations handling FCI or CUI be assessed to determine a required Level of cybersecurity maturity?

Options:

A.

DoD

B.

CISA

C.

NIST

D.

CMMC-AB

Buy Now
Questions 47

Which document specifies the CMMC Level 1 practices that correspond to basic safeguarding requirements?

Options:

A.

NIST SP 800-171

B.

NIST SP 800-171b

C.

48 CFR 52.204-21

D.

DFARS 252.204-7012

Buy Now
Questions 48

What is the MOST common purpose of assessment procedures?

Options:

A.

Obtain evidence.

B.

Define level of effort.

C.

Determine information flow.

D.

Determine value of hardware and software.

Buy Now
Questions 49

Which domains are a part of a Level 1 Self-Assessment?

Options:

A.

Access Control (AC), Risk Management

B.

Risk Management (RM). Access Control (AC), and Physical Protection (PE)

C.

Access Control (AC), Physical Protection (PE), and Identification and Authentication (IA)

D.

Risk Management (RM). Media Protection (MP), and Identification and Authentication (IA)

Buy Now
Questions 50

Which domain references the requirements needed to handle physical or digital assets containing CUI?

Options:

A.

Media Protection (MP)

B.

Physical Protection (PE)

C.

System and Information Integrity (SI)

D.

System and Communications Protection (SC)

Buy Now
Questions 51

Before submitting the assessment package to the Lead Assessor for final review, a CCP decides to review the Media Protection (MP) Level 1 practice evidence to ensure that all media containing FCI are sanitized or destroyed before disposal or release for reuse. After a thorough review, the CCP tells the Lead Assessor that all supporting documents fully reflect the performance of the practice and should be accepted because the evidence is:

Options:

A.

official.

B.

adequate.

C.

compliant.

D.

subjective.

Buy Now
Questions 52

An organization that manufactures night vision cameras is looking for help to address the gaps identified in physical access control systems. Which certified individual should they approach for implementation support?

Options:

A.

CCA of the C3PAO performing the assessment

B.

RP of an organization not part of the assessment

C.

Practitioner of the organization performing the assessment LTP

D.

DoD Contract Official of the organization performing the assessment

Buy Now
Questions 53

An assessor needs to get the most accurate answers from an OSC's team members. What is the BEST method to ensure that the OSC's team members are able to describe team member responsibilities?

Options:

A.

Interview groups of people to get collective answers.

B.

Understand that testing is more important that interviews.

C.

Ensure confidentiality and non-attribution of team members.

D.

Let team members know the questions prior to the assessment.

Buy Now
Questions 54

An OSC has submitted evidence for an upcoming assessment. The assessor reviews the evidence and determines it is not adequate or sufficient to meet the CMMC practice. What can the assessor do?

Options:

A.

Notify the CMMC-AB.

B.

Cancel the assessment.

C.

Postpone the assessment.

D.

Contact the C3PAO for guidance.

Buy Now
Questions 55

Which words summarize categories of data disposal described in the NIST SP 800-88 Revision 1. Guidelines for Media Sanitation?

Options:

A.

Clear, purge, destroy

B.

Clear redact, destroy

C.

Clear, overwrite, purge

D.

Clear, overwrite, destroy

Buy Now
Questions 56

The Lead Assessor is presenting the Final Findings Presentation to the OSC. During the presentation, the Assessment Sponsor and OSC staff inform the assessor that they do not agree with the assessment results. Who has the final authority for the assessment results?

Options:

A.

C3PAO

B.

CMMC-AB

C.

Assessment Team

D.

Assessment Sponsor

Buy Now
Questions 57

Which phase of the CMMC Assessment Process includes developing the assessment plan?

Options:

A.

Phase 1

B.

Phase 2

C.

Phase 3

D.

Phase 4

Buy Now
Questions 58

When assessing SI.L2-3.14.6: Monitor communications for attack, the CCA interviews the person responsible for the intrusion detection system and examines relevant policies and procedures for monitoring organizational systems. What would be a possible next step the CCA could conduct to gather sufficient evidence?

Options:

A.

Conduct a penetration test

B.

Interview the intrusion detection system's supplier.

C.

Upload known malicious code and observe the system response.

D.

Review an artifact to check key references for the configuration of the IDS or IPS practice for additional guidance on intrusion detection and prevention systems.

Buy Now
Questions 59

Which assessment method compares actual-specified conditions with expected behavior?

Options:

A.

Test

B.

Examine

C.

Compile

D.

Interview

Buy Now
Questions 60

Which NIST SP discusses protecting CUI in nonfederal systems and organizations?

Options:

A.

NIST SP 800-37

B.

NIST SP 800-53

C.

NIST SP 800-88

D.

NIST SP 800-171

Buy Now
Questions 61

A Lead Assessor is preparing to conduct a Readiness Review during Phase 1 of the Assessment Process. How much evidence MUST be gathered for each practice?

Options:

A.

A sufficient amount

B.

At least 2 Assessment Objects

C.

Evidence that is deemed adequate

D.

Evidence to support at least 2 Assessment Methods

Buy Now
Exam Code: CMMC-CCP
Exam Name: Certified CMMC Professional (CCP) Exam
Last Update: Sep 13, 2025
Questions: 206

PDF + Testing Engine

$72.6  $181.49

Testing Engine

$57.8  $144.49
buy now CMMC-CCP testing engine

PDF (Q&A)

$49.8  $124.49
buy now CMMC-CCP pdf