100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Level 2 CJIS Security Test Correct 100%

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
25-01-2025
Written in
2024/2025

The CJIS Security Policy outlines the minimum requirements. Each criminal justice agency is encouraged to develop internal security training that defines local and agency specific policies and procedures. - ANSWER True What agencies should have written policy describing the actions to be taken in the event of a security incident? - ANSWER Every agency accessing CJI

Show more Read less
Institution
CJIS
Course
CJIS








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CJIS
Course
CJIS

Document information

Uploaded on
January 25, 2025
Number of pages
2
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • level 2 cjis security

Content preview

Level 2 CJIS Security Test Correct 100%
The CJIS Security Policy outlines the minimum requirements. Each criminal justice
agency is encouraged to develop internal security training that defines local and agency
specific policies and procedures. - ANSWER True

What agencies should have written policy describing the actions to be taken in the event
of a security incident? - ANSWER Every agency accessing CJI

Criminal History Record Information (CHRI) is arrest-based data and any derivative
information from that record. - ANSWER True

During social engineering, someone pretends to be ________ in an attempt to gain illicit
access to protected data systems. - ANSWER an authorized user or other trusted
source

Who should report any suspected security incident? - ANSWER All personnel

Hard copies of CJI data should be ________when no longer required. - ANSWER
physically destroyed

Users do not need to log off of the software/system at the end of the shift or when
another operator wants to use the software/system. - ANSWER False

Agencies are not required to develop and publish internal information security policies,
including penalties for misuse. - ANSWER False

Custodial workers that access the terminal area must have a fingerprint background
check done and training unless they are escorted in these areas. - ANSWER True

Training for appropriate personnel would include people who read criminal histories but
do not have a NCIC workstation of their own. - ANSWER True

A physically secure location is a facility, a criminal justice conveyance, or an area, a
room, or a group of rooms within a facility with both the physical and personnel security
controls sufficient to protect CJI and associated information systems. - ANSWER True

Sometimes you may only see indicators of a security incident. - ANSWER True

All persons who have access to CJI are required to have security training within _____
months of assignment. - ANSWER 6

Training for appropriate personnel would include vendors who develop software for
NCIC access. - ANSWER True

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Lecchris West Virgina University
View profile
Follow You need to be logged in order to follow users or courses
Sold
40
Member since
2 year
Number of followers
15
Documents
3203
Last sold
3 weeks ago
LECCHRIS

3.8

6 reviews

5
2
4
1
3
3
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions