cyberab cmmc-cca practice test

Exam Title: Certified CMMC Assessor (CCA) Exam

Last update: Nov 27 ,2025
Question 1

In ensuring it meets its mandates to protect CUI under CMMC, a contractor has implemented a
robust, dynamic session lock with pattern-hiding displays to prevent access and viewing of data.
After every 5 minutes of inactivity, the current session is locked and a blank, black screen with a
battery life indicator is displayed. How is Session Lock typically initiated?

  • A. Automatically, after a predefined period of inactivity
  • B. By the system administrator manually
  • C. Through user authentication processes
  • D. Only when manually triggered by the user before leaving their workstation
Answer:

A


Explanation:
Comprehensive and Detailed In-Depth Explanatio n:
CMMC practice AC.L2-3.1.10 – Session Lock mandates that organizations "initiate a session lock after
a defined period of inactivity" to prevent unauthorized access to systems handling CUI. The typical
and required initiation method is automatic, triggered by a predefined inactivity threshold (e.g., 5
minutes in this case), ensuring consistent protection without relying on user or admin intervention.
Manual initiation by a system administrator or user is less effective and not scalable, while user
authentication processes relate to unlocking, not initiating the lock. The CMMC guide emphasizes
automation to enforce this control uniformly across systems.
Extract from Official CMMC Documentation:
CMMC Assessment Guide Level 2 (v2.0), AC.L2-3.1.10: "Initiate session lock after an organization-
defined time period of inactivity (e.g., 15 minutes or less)."
NIST SP 800-171A, 3.1.10: "Test mechanisms to ensure session lock occurs automatically after a
specified period of inactivity."
Resources:
https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level2_MasterV2.0_FINAL_20211201
6_508.pdf

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

During your assessment of CA.L2-3.12.3 – Security Control Monitoring, the contractor’s CISO informs
you that they have established a continuous monitoring program to assess the effectiveness of their
implemented security controls. When examining their security planning policy, you determine they
have a list of automated tools they use to track and report weekly changes in the security controls.
The contractor has also established a feedback mechanism that helps them identify areas of
improvement in their security controls. Chatting with employees, you understand the contractor
regularly invites resource persons to train them on the secure handling of information and
identifying gaps in security controls implemented. You would rely on all of the below evidence to
assess the contractor’s implementation of CA.L2-3.12.3 – Security Control Monitoring, EXCEPT?

  • A. Records/logs of monitoring activities over time
  • B. Customer feedback on the contractor's security measures
  • C. Reports or dashboards from the monitoring activities
  • D. The contractor’s security monitoring policies and procedures
Answer:

B


Explanation:
Comprehensive and Detailed In-Depth Explanatio n:
CA.L2-3.12.3 requires "continuous monitoring of security controls." Evidence like logs (A), reports
(C), and policies (D) directly demonstrate the program’s operation and effectiveness. Customer
feedback (B) is external and unrelated to internal monitoring processes, per the CMMC guide’s focus
on operational artifacts.
Extract from Official CMMC Documentation:
CMMC Assessment Guide Level 2 (v2.0), CA.L2-3.12.3: "Examine logs, reports, and monitoring
policies."
NIST SP 800-171A, 3.12.3: "Focus on internal monitoring evidence."
Resources:
https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level2_MasterV2.0_FINAL_20211201
6_508.pdf

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

In ensuring it meets its mandates to protect CUI under CMMC, a contractor has implemented a
robust, dynamic session lock with pattern-hiding displays to prevent access and viewing of data.
After every 5 minutes of inactivity, the current session is locked and a blank, black screen with a
battery life indicator is displayed. As a CCA, you will potentially use the following assessment
methods to examine the contractor’s implementation of session lock EXCEPT?

  • A. Interview the system administrator
  • B. Examine the system design documentation
  • C. Test the strength of the user’s password
  • D. Test the mechanisms implementing the access control policy for session lock
Answer:

C


Explanation:
Comprehensive and Detailed In-Depth Explanatio n:
AC.L2-3.1.10 – Session Lock requires "initiating a session lock after inactivity." Interviewing admins
(A), examining docs (B), and testing mechanisms (D) assess implementation. Password strength (C)
relates to IA.L2-3.5.7, not session lock, per the CMMC guide’s focus on lock-specific methods.
Extract from Official CMMC Documentation:
CMMC Assessment Guide Level 2 (v2.0), AC.L2-3.1.10: "Interview, examine docs, test lock
mechanisms."
NIST SP 800-171A, 3.1.10: "Exclude password strength from lock assessment."
Resources:
https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level2_MasterV2.0_FINAL_20211201
6_508.pdf

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

You are assessing a contractor that develops software for air traffic control systems. In reviewing
their documentation, you find that a single engineer is responsible for designing new ATC system
features, coding the software updates, testing the changes on the development network, and
deploying the updates to the production ATC system for customer delivery. How will proper
separation of duties help the contractor meet the intent of AC.L2-3.1.4 – Separation of Duties?

  • A. It allows the engineers to specialize in specific areas
  • B. It reduces concentrated privileges and power and improves checks & balances. Errors and malicious actions are more likely to be caught. Risk is reduced without relying solely on one individual
  • C. It reduces the overall cost of software development
  • D. It simplifies the development process
Answer:

B


Explanation:
Comprehensive and Detailed In-Depth Explanatio n:
AC.L2-3.1.4 requires "separating duties to reduce risk of unauthorized activity." A single engineer
handling all tasks concentrates privileges, increasing error or malice risks. Separation (B) distributes
responsibilities, enhancing oversight and reducing reliance on one person, per CMMC intent.
Specialization (A), cost (C), and simplicity (D) are secondary or irrelevant.
Extract from Official CMMC Documentation:
CMMC Assessment Guide Level 2 (v2.0), AC.L2-3.1.4: "Separation reduces risk via checks and
balances."
NIST SP 800-171A, 3.1.4: "Distribute duties to mitigate insider threats."
Resources:
https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level2_MasterV2.0_FINAL_20211201
6_508.pdf

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

An engineering company works on DoD contracts that involve handling CUI. They use hardcopy
media such as printed paper, microfilms, and digital media, including flash drives, SSDs, DVDs, and
internal and external hard drives. During a CMMC assessment, you discover the engineering
company has defined procedures addressing media storage and access governed by an access control
policy. All media containing CUI is marked and stored in biometrically locked cabinets. To store CUI
on digital media, an authorized user must be identified using their biometrics or authenticated using
an integrated MFA solution. To access non-digital media, the user must be on a defined list of
authorized personnel and sign three forms. You also learn that the contractor maintains a
comprehensive inventory of all CUI media. The scenario describes a multi-factor authentication
(MFA) solution being used to access digital media containing CUI. However, the access control
procedures for non-digital media require authorized personnel to sign three separate forms. While
both methods aim to verify user identity, which of the following is the MOST significant security
concern associated with the reliance on a paper-based form process?

  • A. The paper forms cannot be easily integrated with other security systems
  • B. It can be time-consuming to complete the forms for frequent access
  • C. It requires users to memorize more information for access
  • D. The forms are susceptible to forgery, resulting in unauthorized access
Answer:

D


Explanation:
Comprehensive and Detailed In-Depth Explanatio n:
MP.L2-3.8.2 requires "restricting access to CUI on system media to authorized users." The paper-
based form process for non-digital media, while aiming to verify identity, is vulnerable to forgery (D),
which could allow unauthorized access to CUI—a direct security threat. Integration issues (A) and
time consumption (B) are operational concerns, not immediate risks, and memorization (C) isn’t
relevant. The CMMC guide prioritizes robust, tamper-resistant access controls, and paper forms lack
the security of MFA.
Extract from Official CMMC Documentation:
CMMC Assessment Guide Level 2 (v2.0), MP.L2-3.8.2: "Ensure access controls prevent unauthorized
access; paper processes should be secure."
NIST SP 800-171A, 3.8.2: "Assess risks of forgery in manual access methods."
Resources:
https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level2_MasterV2.0_FINAL_20211201
6_508.pdf

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

A vulnerability scan on a defense contractor's system identifies a critical security flaw in a legacy
database application that stores CUI. Remediating the flaw would require a complete overhaul of the
application, causing significant downtime and potentially disrupting critical business functions. Given
the potential consequences of remediation, the contractor is considering deferring the fix. Which
course of action best aligns with the guidance of CMMC practice RA.L2-3.11.3 – Vulnerability
Remediation?

  • A. Immediately contract a third party to assist with remediation
  • B. Document the risk acceptance rationale and continue monitoring the risk from the vulnerability
  • C. Permanently disregard the vulnerability and take no further action
  • D. Implement compensating controls to reduce the associated risk
Answer:

B


Explanation:
Comprehensive and Detailed In-Depth Explanatio n:
RA.L2-3.11.3 requires "remediating vulnerabilities in accordance with risk assessments." If
remediation isn’t feasible, the practice allows risk acceptance with documentation and ongoing
monitoring, balancing operational needs and security. Ignoring the vulnerability (C) violates the
practice, while third-party help (A) or compensating controls (D) may not be immediately practical.
The CMMC guide supports risk-based decisions with proper documentation.
Extract from Official CMMC Documentation:
CMMC Assessment Guide Level 2 (v2.0), RA.L2-3.11.3: "Document risk acceptance and monitor
unremediated vulnerabilities."
NIST SP 800-171A, 3.11.3: "Examine risk acceptance rationale and monitoring plans."
Resources:
https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level2_MasterV2.0_FINAL_20211201
6_508.pdf

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

Any user that accesses CUI on system media should be authorized and have a lawful business
purpose. While assessing a contractor’s implementation of MP.L2-3.8.2 – Media Access, youexamine
the CUI access logs and the role of employees. Something catches your eye where an ID of an
employee listed as terminated regularly accesses CUI remotely. Walking into the contractor’s
facilities, you observe the janitor cleaning an office where documents marked CUI are visible on the
table. Interviewing the organization’s data custodian, they informed you that a media storage
procedure is augmented by a physical protection and access control policy. Based on the scenario
and the requirements of CMMC practice MP.L2-3.8.2 – Media Access, which of the following actions
would be the highest priority recommendation for the contractor?

  • A. Conduct additional training for employees on handling CUI materials
  • B. Develop and implement a process for timely disabling or revoking access to CUI upon employee termination
  • C. Implement a system for logging and monitoring all access attempts to CUI resources
  • D. Invest in more sophisticated access control technology for their systems
Answer:

B


Explanation:
Comprehensive and Detailed In-Depth Explanatio n:
CMMC practice MP.L2-3.8.2 – Media Access requires organizations to "restrict access to CUI on
system media to authorized users." The scenario reveals a critical failure: a terminated employee’s ID
continues to access CUI remotely, indicating a lack of timely revocation processes. This poses an
immediate security risk, as unauthorized access to CUI violates the practice’s core intent. Developing
and implementing a process to disable access upon termination (B) directly addresses this gap and is
the highest priority to ensure compliance and protect CUI. Training (A) is beneficial but doesn’t fix
the revocation issue, logging (C) is already partially in place and doesn’t address termination, and
new technology (D) is secondary to procedural fixes. The CMMC guide emphasizes timely access
control as critical.
Extract from Official CMMC Documentation:
CMMC Assessment Guide Level 2 (v2.0), MP.L2-3.8.2: "Restrict media access to authorized users;
ensure processes revoke access when no longer needed."
NIST SP 800-171A, 3.8.2: "Examine processes for removing access upon termination."
Resources:
https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level2_MasterV2.0_FINAL_20211201
6_508.pdf

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

CMMC practice PS.L2-3.9.1 – Screen Individuals requires individuals to be screened before
authorizing access to organizational systems containing CUI. However, in the assessment you are
currently conducting, there is no physical evidence confirming the completion of personnel screens,
such as background checks, only affirmations derived from an interview session. In an interview with
the HR Manager, they informed you that before an individual is hired, they submit their information
through a service that performs criminal and financial checks. How would you score the OSC's
implementation of CMMC practice PS.L2-3.9.1 – Screen Individuals, objective [a]?

  • A. More information is needed
  • B. Not Met
  • C. Not Applicable
  • D. Met
Answer:

A


Explanation:
Comprehensive and Detailed In-Depth Explanatio n:
PS.L2-3.9.1, objective [a], requires "screening individuals prior to authorizing access to CUI systems."
The HR Manager’s affirmation suggests a process, but without physical evidence (e.g., screening
records), compliance can’t be confirmed. More information (A) is needed to verify, per CMMC’s
evidence-based assessment. Met (D) requires proof, Not Met (B) assumes failure prematurely, and
N/A (C) doesn’t apply.
Extract from Official CMMC Documentation:
CMMC Assessment Guide Level 2 (v2.0), PS.L2-3.9.1: "Examine screening records; interviews support
but don’t replace evidence."
NIST SP 800-171A, 3.9.1: "Verify with documentation."
Resources:
https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level2_MasterV2.0_FINAL_20211201
6_508.pdf

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

When assessing a contractor’s implementation of CMMC practices, you examine its SystemSecurity
Plan (SSP) to identify its documented measures for audit reduction and reporting. They have a
dedicated section in their SSP addressing the Audit and Accountability requirements. You proceed to
interview their information security personnel, who informed you that the contractor has a
dedicated Security Operations Center (SOC) and uses Splunk to reduce and report audit logs. What
key features regarding the deployment of Splunk for AU.L2-3.3.6 – Reduction & Reporting would you
be interested in assessing?

  • A. Ensure that Splunk is configured with appropriate RBAC to restrict access to log data, reports, and dashboards, ensuring that only authorized personnel can view or modify audit logs
  • B. Ensure Splunk can retain audit records for a protracted amount of time
  • C. Ensure that Splunk employs various filter rules for reducing audit logs to eliminate non-essential data and processes to analyze large volumes of log files or audit information, identifying anomalies and summarizing the data in a format more meaningful to analysts, thus generating customized reports
  • D. Ensure Splunk can support compliance dashboards that provide real-time visibility into CMMC compliance status
Answer:

C


Explanation:
Comprehensive and Detailed In-Depth Explanatio n:
AU.L2-3.3.6 requires "audit reduction and report generation capabilities." Key features to assess in
Splunk are filtering to reduce logs and analysis/reporting (C), directly meeting objectives [a] and [b].
RBAC (A) relates to AU.L2-3.3.8, retention (B) to AU.L2-3.3.2, and dashboards (D) aren’t required, per
CMMC focus.
Extract from Official CMMC Documentation:
CMMC Assessment Guide Level 2 (v2.0), AU.L2-3.3.6: "Assess tools for [a] reducing logs via filters, [b]
generating reports with analysis."
NIST SP 800-171A, 3.3.6: "Examine reduction and reporting functions."
Resources:
https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level2_MasterV2.0_FINAL_20211201
6_508.pdf

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

CMMC practice MA.L2-3.7.3 – Equipment Sanitization requires organizations to sanitize equipment
leaving their facilities for off-site maintenance for CUI. What standard would the OSC use to sanitize
various media?

  • A. NIST SP 800-53
  • B. NIST SP 800-88
  • C. NIST SP 800-171
  • D. NIST SP 800-171A
Answer:

B


Explanation:
Comprehensive and Detailed In-Depth Explanatio n:
MA.L2-3.7.3 mandates "sanitizing equipment for CUI prior to off-site maintenance."NIST SP 800-88 –
Guidelines for Media Sanitization(B) provides specific methods (e.g., clearing, purging, destroying)
tailored to media types, ensuring CUI is irrecoverable—directly supporting this practice. NIST SP 800-
53 (A) is a broader control framework, NIST SP 800-171 (C) defines CMMC requirements without
sanitization details, and NIST SP 800-171A (D) is an assessment guide, not a sanitization standard.
The CMMC guide references NIST SP 800-88 explicitly.
Extract from Official CMMC Documentation:
CMMC Assessment Guide Level 2 (v2.0), MA.L2-3.7.3: "Sanitize per NIST SP 800-88 guidelines."
NIST SP 800-171A, 3.7.3: "Refer to NIST SP 800-88 for sanitization standards."
Resources:
https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level2_MasterV2.0_FINAL_20211201
6_508.pdf

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 32
Viewing questions 1-10 out of 325
Go To
page 2