Questions & Answers(RATED A+)
1. An example of a security incident indicator is: - ANSWER Sudden high activity on an
account that has had little or no activity for months
Any incidents or unusual activity should be reported to your agency contact, LASO, or
Information Security Officer immediately - ANSWER True
Access to and use of CJI and CHRI is for: - ANSWER Criminal justice purposes and
authorized noncriminal justice functions only
1. Organizational policy does not have to cover the posting of information on personal
social media pages. - ANSWER False
Which of the following should be included in a Security Incident Report? - ANSWER All
of these are correct
The security principle of _______ is the division of roles and responsibilities so that
different individuals perform each function related to administrative duties. - ANSWER
Separation of duties
Which of the following contains CHRI and is considered to be a restricted file? -
ANSWER National Sex Offender Registry Files
Malicious code, also known as _______, refers to a program that is covertly inserted
into another program with the intent to compromise the confidentiality, integrity, or
availability of the data - ANSWER Malware
Only members of the management team are responsible for ensuring that physically
secure areas stay secure. - ANSWER False
Agencies must authorize and control system-related items entering and exiting the
physically secure location. - ANSWER True
Private contractors who perform criminal justice functions must meet the same training
and certification criteria required by governmental agencies performing a similar
function. - ANSWER True
CJI can include which of the following types of data? - ANSWER All of these are correct
After the initial training, how often must Security and Privacy Training be completed? -
ANSWER Every year