Question 6
An OSC allows some employees to use their personal devices (laptops, tablets) for work purposes. The OSC enforces a Bring Your Own Device (BYOD) policy that requires employees to install Mobile Device Management (MDM) software on their devices. The MDM allows for remotewiping of lost or stolen devices and enforces access control policies. Employees use VPNs to remotely access the OSC network from their personal devices. What challenges might a CCA face when collecting evidence to assess the OSC's compliance with AC.L2-3.1.12 - Control Remote Access?
Question 7
The OSC has contracted a C3PAO to perform a CMMC assessment. During Phase 1, the C3PAO discovers that the OSC does not have a Commercial and Government Entity (CAGE) code. The OSC's Assessment Official argues that they have never needed one before and asks what they should do. What should the Lead Assessor tell the OSC Assessment Official?
Question 8
A C3PAO Assessment Team has completed assessing an OSC's implementation of the CMMC practices.
They are now in the process of archiving the assessment artifacts as per the CAP. However, the OSC informed the Assessment Team that they could not take the artifacts offsite even after completing the assessment. The Assessment Team is concerned that the OSC may change the assessment artifacts, compromising their integrity. What should the Assessment Team recommend that the OSC do to protect the confidentiality and integrity of the Assessment Artifacts?
They are now in the process of archiving the assessment artifacts as per the CAP. However, the OSC informed the Assessment Team that they could not take the artifacts offsite even after completing the assessment. The Assessment Team is concerned that the OSC may change the assessment artifacts, compromising their integrity. What should the Assessment Team recommend that the OSC do to protect the confidentiality and integrity of the Assessment Artifacts?
Question 9
A software development company is applying for a CMMC Level 2 assessment. As the Lead Assessor, you request access to the company's System Security Plan (SSP) as part of the initial objective evidence for validating the scope. Which of the following is true about the software development company's obligations in honoring the request?
Question 10
You are a Certified CMMC Assessor (CCA) working with a small defense contractor who needs a CMMC Level 2 assessment. This is their first CMMC assessment. During your initial meeting with the OSC, they express a desire for a quick assessment to minimize disruption to their daily operations. They also mention their limited budget for the assessment. How will you proceed with assessment framing in this scenario?
