What does vehicle data in a Wanted Person record indicate? - Answers The entering agency has
reasonable grounds to believe the wanted person may be in possession of the vehicle.
The and Known or Appropriately Suspected Terrorist File (KST) have been designed to: - Answers
Provide identifying information about violent criminal gangs and terrorist organizations and members of
those gangs and organizations to law enforcement personnel only.
Penalties for violating the regulations regarding the use and dissemination of criminal history shall be
subject to a civil penalty of a fine not to exceed $11,000. - Answers True
When sending an Administrative message for a non-terminal agency the Terminal Agency should use the
ORI/agency identifiers for the terminal Agency. - Answers False
Civil Protection Orders can be entered into IDACS/NCIC. - Answers True
Confirming a "hit" means: - Answers The entering agency must be contacted to insure the person or
property is identical and the case still active.
All transactions on the system are subject to review for inappropriate or illegal activity. - Answers True
When entering a stolen Gun (EG) into NCIC/IDACS and more than one number appears on the firearm. -
Answers The serial number on the frame or receiver should be placed in the (SER) serial number field
and other number(s) should be entered in the (MIS) Miscellaneous field.
Paint ball guns and BB guns are entered into which file? - Answers Article File
When entering a stolen article (EA) and no brand name exists for the property, enter _______ in the BRA
field and describe the item and in the MIS field. - Answers NO BRA
A vehicle used in the commission of a felony maybe entered into which one of the following files
providing the whereabouts of the vehicle is unknown? - Answers Vehicle File
You can control access by turning screens away from visitors and public view. - Answers True
Response time may vary when making an inquiry into the INS Alien File. However, the LESC will provide:
- Answers An automated acknowledgement notifying the inquiring agency that his/her inquiry has been
received and is being processed.
An inquiry into the Wanted/Missing (QW) Files: - Answers Spawns inquiries to several other files,
including Sex Offender, Gang File, and Protection Order File.
The purpose of an FQ (NLETS Full Data Inquiry) inquiry is: - Answers To retrieve a full record from a state
repository when a positive response has been received.
The parole, probation, and corrections transactions are available through all 50 states. - Answers False
, A living person cannot be entered into the Unidentified File. - Answers False
All BMV information is the property of the BMV and is to be used for criminal justice purposes and can
be given to the public. - Answers False
The Privacy Act of 1974 requires the FBI to maintain an audit trail of the purpose of each disclosure of
criminal history record and the recipient of that record. - Answers True
Related search hits (RSH) will return all: - Answers Entries with the same ORI and OCA.
An inquiry on a stolen boat (QB) may be made by using the following identifiers: - Answers Any of the
above
When a positive hit response is received from the Protective Interest File (Formerly the USSS file): -
Answers No arrest or detention should be made based on the information contained in this file
When an entering agency fails to respond to a second request for hit confirmation, the inquiring agency
will generate a: - Answers Third request which will be sent to the agency ORI, data operations, and ncic.
The maximum number of images that a Protection Order record can contain is: - Answers One (1) Mug
Shot, Ten (10) Identifying images, and one (1) Signature
What is the maximum number of identifiers that ca be used in the distribution field for an
Administrative Message? - Answers Five
A "HIT" or positive response in IDACS/NCIC is always the correct person or property. - Answers False
A cancellation message is used when it is determined that the record is invalid, the property is not
stolen, or a false report was made. - Answers True
The user's password must be changed every: - Answers 90 days
A stolen VIN plate would be entered into which file? - Answers Vehicle Part File
What agency is responsible for placing a locate on an IDACS/NCIC wanted entry? - Answers The
recovering agency if other than the agency that entered the record.
According to 240 IAC 5-1-3, CHRI/III, Sex Offenders, Gang File and Known or Appropriately Suspected
Terrorist File inquires must be maintained for one year. - Answers True
An inquiry into the Article File must include type (TYP) of article, and SER and/or OAN. - Answers True
All Administrative messages (AM) or Hot File Broadcasts (HFB) must be a bona fide need and nature,
pertaining a law enforcement/criminal justice duties and responsibilities. - Answers True
Inquiries and record requests transmitted to III must include: - Answers The purpose for which the
information is to be used.