Question 76

During the Planning phase, the C3PAO and Lead Assessor will collect information from the OSC to provide a Rough Order of Magnitude (ROM). This enables the Assessor to approximate the duration, schedule, and cost of the Assessment. To determine the Rough Order of Magnitude (ROM), the Lead Assessor can use the following inputs, EXCEPT?
  • Question 77

    The OSC prints out documents it receives via email that are marked as CUI. According to MP.L2-3.8.4:
    Media Markings,
    what should the Assessor expect to see on the printouts?
  • Question 78

    While assessing an OSC, you realize they have given identifiers to systems, users, and processes. Examining their documentation, you know they have assigned accounts uniquely to employees, contractors, and subcontractors. The OSC has an automated system that disables any identifiers that are left unused for 6 months. You also learn from interviewing IT security administrators that the OSC has defined a technical and documented policy where identifiers can only be reused after 12 months. How would you score the contractor' s implementation of CMMC practice IA.L2-3.5.5 - Identifier Reuse?
  • Question 79

    During a CMMC assessment, an OSC employee tells the CCA that they don't follow a documented procedure because "it's outdated," but they have an informal process that works better. The informal process appears to meet the practice's objectives. How should the CCA proceed?
  • Question 80

    In completing the assessment of practices in the Access Control (AC) domain, a CCA scored AC.L2-3.1.15:
    Privileged Remote Access as NOT MET. The OSC was notified of this deficiency at the end of day two of the assessment. On day five of the assessment, the OSC's Assessment Official contacted the CCA to provide evidence that the deficiencies have been corrected.
    What is the CCA's NEXT step?