answers
During social engineering, someone pretends to be ________ in an attempt to gain
illicit access to protected data systems. - ANSWER -an authorized user or other
trusted source
Who should report any suspected security incident? - ANSWER -All personnel
Hard copies of CJI data should be ________when no longer required. - ANSWER
-physically destroyed
Users do not need to log off of the software/system at the end of the shift or when
another operator wants to use the software/system. - ANSWER -False
Agencies are not required to develop and publish internal information security
policies, including penalties for misuse. - ANSWER -False
Custodial workers that access the terminal area must have a fingerprint
background check done and training unless they are escorted in these areas. -
ANSWER -True
Training for appropriate personnel would include people who read criminal
histories but do not have a NCIC workstation of their own. - ANSWER -True
FBI CJI data may be shared with close friends. - ANSWER -False
FBI CJI data is any data derived from the national CJIS Division systems. -
ANSWER -True
You should never email Criminal Justice Information(CJI) unless your agency's
email system meets all the requirements outlined in the latest CJIS Security policy.
- ANSWER -True