Cyber AB CMMC CCP Certified CMMC Professional (CCP) Exam Online Training
Cyber AB CMMC CCP Online Training
The questions for CMMC CCP were last updated at Apr 13,2025.
- Exam Code: CMMC CCP
- Exam Name: Certified CMMC Professional (CCP) Exam
- Certification Provider: Cyber AB
- Latest update: Apr 13,2025
Which organization is the governmental authority responsible for identifying and marking CUI?
- A . NARA
- B . NIST
- C . CMMC-AB
- D . Department of Homeland Security
A company is about to conduct a press release. According to AC.L1-3.1.22: Control information posted or processed on publicly accessible systems, what is the MOST important factor to consider when addressing CMMC requirements?
- A . That the information is correct
- B . That the CEO approved the message
- C . That the company has to safeguard the release of FCI
- D . That so long as the information is only FCI, it can be released
A Lead Assessor has been assigned to a CMMC Assessment During the assessment, one of the assessors approaches with a signed policy. There is one signatory, and that person has since left the company. Subsequently, another person was hired into that position but has not signed the document.
Is this document valid?
- A . The signatory is the authority to implement and enforce the policy, and since that person is no longer with the company, the policy is not valid.
- B . More research on the company policy of creating, implementing, and enforcing policies is needed. If the company has a policy identifying the authority as with the position or person, then the policy is valid.
- C . The signatory does not validate or invalidate the policy. For the purpose of this assessment, ensuring that the policy is current and is being implemented by the individuals who are performing the work is sufficient.
- D . The authority to implement and enforce lies with the position, not the person. As long as that position’s authority and responsibilities have not been removed from implementing that domain, it is still a valid policy.
A CMMC Level 1 Self-Assessment identified an asset in the OSC’s facility that does not process, store, or transmit FCI.
Which type of asset is this considered?
- A . FCI Assets
- B . Specialized Assets
- C . Out-of-Scope Assets
- D . Government-Issued Assets
When assessing SI.L1-3.14.2: Provide protection from malicious code at appropriate locations within organizational information systems, evidence shows that all of the OSC’s workstations and servers have antivirus software installed for malicious code protection. A centralized console for the antivirus software management is in place and records show that all devices have received the most updated antivirus patterns.
What is the BEST determination that the Lead Assessor should reach regarding the evidence?
- A . It is sufficient, and the audit finding can be rated as MET.
- B . It is insufficient, and the audit finding can be rated NOT MET.
- C . It is sufficient, and the Lead Assessor should seek more evidence.
- D . It is insufficient, and the Lead Assessor should seek more evidence.
Which MINIMUM Level of certification must a contractor successfully achieve to receive a contract award requiring the handling of CUI?
- A . Level 1
- B . Level 2
- C . Level 3
- D . Any level
Which document is the BEST source for determining the sources of evidence for a given practice?
- A . NISTSP 800-53
- B . NISTSP 800-53A
- C . CMMC Assessment Scope
- D . CMMC Assessment Guide
Which document is the BEST source for descriptions of each practice or process contained within the various CMMC domains?
- A . CMMC Glossary
- B . CMMC Appendices
- C . CMMC Assessment Process
- D . CMMC Assessment Guide Levels 1 and 2
An Assessment Team is conducting interviews with team members about their roles and responsibilities. The team member responsible for maintaining the antivirus program knows that it was deployed but has very little knowledge on how it works.
Is this adequate for the practice?
- A . Yes, the antivirus program is available, so it is sufficient.
- B . Yes, antivirus programs are automated to run independently.
- C . No, the team member must know how the antivirus program is deployed and maintained.
- D . No, the team member’s interview answers about deployment and maintenance are insufficient.
When are data and documents with legacy markings from or for the DoD required to be re-marked or redacted?
- A . When under the control of the DoD
- B . When the document is considered secret
- C . When a document is being shared outside of the organization
- D . When a derivative document’s original information is not CUI