Questions and Answers All Correct
The perimeter of the area requiring physical security should be prominently posted. -
Answer- True
If electronic media cannot be physically destroyed, it must be _______ to prevent
unauthorized access to previously stored data. - Answer- Overwritten at least three
times
The security principle of _______ is where individuals are granted only the most
restrictive set of access privileges required to perform their official duties. - Answer-
Least privilege
All training records must be kept current and be maintained for a minimum of three
years. - Answer- True
After the initial training, how often must Security and Privacy Training be completed? -
Answer- Every year
An example of a possible threat to security and privacy is a user accidentally erasing a
critical file while "playing" on the computer. - Answer- True
Any incidents or unusual activity should be reported to your agency contact, LASO, or
Information Security Officer immediately. - Answer- True
The FBI authorized originating agency identifier (ORI) must be used in each transaction
on CJIS systems. - Answer- True
Authorized criminal justice purposes for the use of CJI include: - Answer- All of these
are correct
A security incident is a violation of the CJIS Security Policy that threatens the
confidentiality, integrity, or availability of CJI. - Answer- True
A commonly used type of social engineering is: - Answer- All of these are correct
Encryption is: - Answer- The process of converting information or data into a code to
prevent unauthorized access