Questions & Solutions(GRADED A+)
For personnel with access to CJI, screening requirements must include _______ and
_______ record checks. - ANSWER State of residency; National fingerprint-based
Which of the following contains CHRI and is considered to be a restricted file? -
ANSWER National Sex Offender Registry Files
Information system devices should be positioned so that anyone can view them. -
ANSWER false
Which of the following individual user responsibilities is correct? - ANSWER Users
should face computer monitors away from outside windows, doors, or hallways
Security and Privacy Literacy Training must be taken at the following time(s) - ANSWER
All of these are correct
Security incidents are always very obvious. - ANSWER false
Multi-factor authentication requires the use of: - ANSWER Two or more different factors
to achieve authentication
Remote access may be permitted for privileged functions: - ANSWER Only for
compelling operational needs
Access to controlled areas containing systems/components that access CJI should be: -
ANSWER limited to only those personnel authorized by the agency to access or view
CJI
Unauthorized requests, receipt, release, interception, dissemination, or discussion of
CJI is serious and may result in: - ANSWER All of these are correct
An example of a possible threat to security and privacy is a user accidentally erasing a
critical file while "playing" on the computer. - ANSWER True
Any incidents or unusual activity should be reported to your agency contact, LASO, or
Information Security Officer immediately. - ANSWER True
The FBI authorized originating agency identifier (ORI) must be used in each transaction
on CJIS systems. - ANSWER True
Authorized criminal justice purposes for the use of CJI include: - ANSWER All of these
are correct