Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CJIS Security Test exam questions with correct answers., Exams of Security Analysis

CJIS Security Test exam questions with correct answers

Typology: Exams

2024/2025

Available from 09/08/2024

Lectjoshua
Lectjoshua 🇺🇸

5

(1)

877 documents

1 / 3

Toggle sidebar

Often downloaded together


Related documents


Partial preview of the text

Download CJIS Security Test exam questions with correct answers. and more Exams Security Analysis in PDF only on Docsity! CJIS Security Test exam questions with correct answers FBI |CJI |data |is |sensitive |information |and |security |shall |be |afforded |to |prevent |any |unauthorized |access, |use |or |dissemination |of |the |data. |- |correct |answer-True FBI |CJI |data |must |be |safeguarded |to |prevent: |- |correct |answer-All |of |the |Above Unauthorized |requests, |receipts, |release, |interception, |dissemination |or |discussion |of |FBI |CJI |data |could |result |in |criminal |prosecution |and/or |termination |of |employment. |- |correct |answer-True A |security |incident |shall |be |reported |to |the |CJIS |Systems |Agency's |(CSA's) |Information |Security |Officer |(ISO) |and |include |the |following |information: |date |of |the |incident, |location(s) |of |incident, |systems |affected, |method |of |detection, |nature |of |the |incident, |description |of |the |incident, |actions |taken/resolution, |date |and |contact |information |for |the |agency. |- |correct |answer-True Training |for |appropriate |personnel |would |include |people |who |read |criminal |histories |but |do |not |have |a |NCIC |workstation |of |their |own. |- |correct |answer-True A |security |incident |is |a |violation |or |attempted |violation |of |the |FBI |CJIS |Security |Policy |or |other |security |policy |that |would |threaten |the |confidentiality, |integrity |or |availability |of |FBI |or |State |CJI |data. |- |correct |answer-True FBI |CJI |data |is |any |data |derived |from |the |national |CJIS |Division |Systems. |- |correct |answer-True Electronic |media |includes, |but |is |not |limited |to: |- |correct |answer-All |of |the |Above According |to |many |security |experts, |which |group |constitutes |the |biggest |threat: |- |correct |answer-The |agency's |own |personal Users |do |not |need |to |log |off |of |the |software/system |at |the |end |of |the |shift |or |when |another |operator |wants |to |use |the |software/system. |- |correct |answer-False Training |for |appropriate |personnel |would |include |vendors |who |develop |software |for |NCIC |access. |- |correct |answer-True You |should |never |email |Criminal |Justice |Information |(CJI) |unless |your |agency's |email |system |meets |all |the |requirements |outlined |in |latest |CJIS |Security |policy. |- |correct |answer-True __________ |is |sensitive |data |and |unauthorized |use |could |result |in |criminal |prosecution |or |termination |of |employment. |- |correct |answer-CHRI Sometimes |you |may |only |see |indicators |of |a |security |incident. |- |correct |answer-True Custodial |workers |that |access |the |terminal |area |must |have |a |fingerprint |background |check |done |and |training |unless |they |are |escorted |in |these |areas. |- |correct |answer-True Criminal |History |Record |Information |(CHRI) |includes: |- |correct |answer-All |of |the |above All |persons |who |have |access |to |CJI |are |required |to |have |security |training |within |___ |months |of |assignment. |- |correct |answer-6