1. An instance of a protection incident indicator is: - ANS-Sudden high interest on an account
that has had little or no pastime for months
1. Organizational coverage does no longer must cowl the posting of facts on private social
media pages. - ANS-False
A server linked to a electricity supply with out a surge protector or backup electricity supply is an
instance of a natural protection vulnerability. - ANS-True
Access to and use of CJI and CHRI is for: - ANS-Criminal justice purposes and licensed
noncriminal justice capabilities only
After the initial training, how often need to Security and Privacy Training be finished? -
ANS-Every yr
Agencies should authorize and manipulate system-associated gadgets entering and exiting the
bodily stable location. - ANS-True
Always verify the recipient's authorization BEFORE sending CJI in an e mail. - ANS-True
Any incidents or unusual activity must be said for your company touch, LASO, or Information
Security Officer straight away - ANS-True
CJI can include which of the subsequent types of statistics? - ANS-All of those are correct
If primary password requirements are being followed, person-chosen passwords have to be
modified at the least: - ANS-Every 90 calendar days
Information obtained from the III machine ought to be used for the SAME legal motive for which
it become requested - ANS-True
Malicious code, additionally called _______, refers to a application this is covertly inserted into
any other program with the purpose to compromise the confidentiality, integrity, or availability of
the information - ANS-Malware
Only members of the control team are chargeable for making sure that bodily secure areas live
secure. - ANS-False
Only employees who paintings in law enforcement have to finish Security and Privacy Training. -
ANS-False