CJIS Recertification Test Review with Correct Answers
CJIS Recertification Test Review with Correct Answers For personnel with access to CJI, screening requirements must include _______ and _______ record checks. Correct Answer: State of residency; National fingerprint-based Which of the following contains CHRI and is considered to be a restricted file? Correct Answer: National Sex Offender Registry Files Information system devices should be positioned so that anyone can view them. Correct Answer: false Which of the following individual user responsibilities is correct? Correct Answer: Users should face computer monitors away from outside windows, doors, or hallways Security and Privacy Literacy Training must be taken at the following time(s) Correct Answer: All of these are correct Security incidents are always very obvious. Correct Answer: false Multi-factor authentication requires the use of: Correct Answer: Two or more different factors to achieve authentication Remote access may be permitted for privileged functions: Correct Answer: Only for compelling operational needs Access to controlled areas containing systems/components that access CJI should be: Correct Answer: limited to only those personnel authorized by the agency to access or view CJI Unauthorized requests, receipt, release, interception, dissemination, or discussion of CJI is serious and may result in: Correct Answer: All of these are correct The perimeter of the area requiring physical security should be prominently posted. Correct Answer: True If electronic media cannot be physically destroyed, it must be _______ to prevent unauthorized access to previously stored data. Correct Answer: Overwritten at least three times The security principle of _______ is where individuals are granted only the most restrictive set of access privileges required to perform their official duties. Correct Answer: Least privilege All training records must be kept current and be maintained for a minimum of three years. Correct Answer: True After the initial training, how often must Security and Privacy Training be completed? Correct Answer: Every year An example of a possible threat to security and privacy is a user accidentally erasing a critical file while "playing" on the computer. Correct Answer: True Any incidents or unusual activity should be reported to your agency contact, LASO, or Information Security Officer immediately. Correct Answer: True The FBI authorized originating agency identifier (ORI) must be used in each transaction on CJIS systems. Correct Answer: True Authorized criminal justice purposes for the use of CJI include: Correct Answer: All of these are correct A security incident is a violation of the CJIS Security Policy that threatens the confidentiality, integrity, or availability of CJI. Correct Answer: True A commonly used type of social engineering is: Correct Answer: All of these are correct Encryption is: Correct Answer: The process of converting information or data into a code to prevent unauthorized access Access to and use of CJI and CHRI is for: Correct Answer: Criminal justice purposes and authorized noncriminal justice functions only An authentication factor is: Correct Answer: All of these are correct CJI can include which of the following types of data? Correct Answer: All of these are correct
Written for
- Institution
- Cjis
- Course
- Cjis
Document information
- Uploaded on
- January 1, 2024
- Number of pages
- 3
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- cjis
-
cjis recertification test review with correct answ
-
for personnel with access to cji screening requi
-
which of the following contains chri and is consid
-
information system devices should be positio
Also available in package deal