Download CJIS Security Test exam questions with correct answers. and more Exams Security Analysis in PDF only on Docsity! CJIS Security Test exam questions with correct answers FBI |CJI |data |is |sensitive |information |and |security |shall |be |afforded |to |prevent |any |unauthorized |access, |use |or |dissemination |of |the |data. |- |correct |answer-True FBI |CJI |data |must |be |safeguarded |to |prevent: |- |correct |answer-All |of |the |Above Unauthorized |requests, |receipts, |release, |interception, |dissemination |or |discussion |of |FBI |CJI |data |could |result |in |criminal |prosecution |and/or |termination |of |employment. |- |correct |answer-True A |security |incident |shall |be |reported |to |the |CJIS |Systems |Agency's |(CSA's) |Information |Security |Officer |(ISO) |and |include |the |following |information: |date |of |the |incident, |location(s) |of |incident, |systems |affected, |method |of |detection, |nature |of |the |incident, |description |of |the |incident, |actions |taken/resolution, |date |and |contact |information |for |the |agency. |- |correct |answer-True Training |for |appropriate |personnel |would |include |people |who |read |criminal |histories |but |do |not |have |a |NCIC |workstation |of |their |own. |- |correct |answer-True A |security |incident |is |a |violation |or |attempted |violation |of |the |FBI |CJIS |Security |Policy |or |other |security |policy |that |would |threaten |the |confidentiality, |integrity |or |availability |of |FBI |or |State |CJI |data. |- |correct |answer-True FBI |CJI |data |is |any |data |derived |from |the |national |CJIS |Division |Systems. |- |correct |answer-True Electronic |media |includes, |but |is |not |limited |to: |- |correct |answer-All |of |the |Above According |to |many |security |experts, |which |group |constitutes |the |biggest |threat: |- |correct |answer-The |agency's |own |personal Users |do |not |need |to |log |off |of |the |software/system |at |the |end |of |the |shift |or |when |another |operator |wants |to |use |the |software/system. |- |correct |answer-False Training |for |appropriate |personnel |would |include |vendors |who |develop |software |for |NCIC |access. |- |correct |answer-True You |should |never |email |Criminal |Justice |Information |(CJI) |unless |your |agency's |email |system |meets |all |the |requirements |outlined |in |latest |CJIS |Security |policy. |- |correct |answer-True __________ |is |sensitive |data |and |unauthorized |use |could |result |in |criminal |prosecution |or |termination |of |employment. |- |correct |answer-CHRI Sometimes |you |may |only |see |indicators |of |a |security |incident. |- |correct |answer-True Custodial |workers |that |access |the |terminal |area |must |have |a |fingerprint |background |check |done |and |training |unless |they |are |escorted |in |these |areas. |- |correct |answer-True Criminal |History |Record |Information |(CHRI) |includes: |- |correct |answer-All |of |the |above All |persons |who |have |access |to |CJI |are |required |to |have |security |training |within |___ |months |of |assignment. |- |correct |answer-6