nexTest study guide
The agency that entered a record, also known as the originating agency, must be
available 24 hours a day to confirm record entries - answersTrue
Security Incidents are always very obvious - answersFalse
The FDLE Missing Endangered Person Information Clearinghouse (MEPIC) can assist
agencies with unidentified deceased investigations - answersTrue
Which of the following is a threat to handheld devices? - answersElectronic Tracking
Loss of Device
Theft of Device
Bluetooth Technology is susceptible to general wireless networking threats, such as
denial of service, eavesdropping, man-in-the-middle attacks, and message modification
- answersTrue
An agency holding multiple warrants on the same subject may enter each warrant
separately into the FCIC/NCIC Wanted Person File - answersFALSE
Operators should query record information before entering it to see if it is already in the
system - answersTrue
A __________ is performed to remove a record if the agency determines the
information is unfounded, a false report, an erroneous entry or not valid in any way -
answersCancel
The National Insurance Crime Bureau (NICB) provides an international database
containing information on - answersVehicles
NCIC will send a $.K message 72 hours after the entry of a - answersPerson with
Information
During Hit Confirmation, operators must review the ___________ field for an alternate
hit confirmation ORI - answersMiscellaneous (MIS)
When entering a record the Miscellaneous Field is used to provide additional data to
describe the record entry, beyond the available fields on the entry form, to increase the
likelihood of the record being found and recovered - answersTrue
Guns can be entered using the model number as the serial number - answersFalse
The agency that entered a record, also known as the originating agency, must be
available 24 hours a day to confirm record entries - answersTrue
Security Incidents are always very obvious - answersFalse
The FDLE Missing Endangered Person Information Clearinghouse (MEPIC) can assist
agencies with unidentified deceased investigations - answersTrue
Which of the following is a threat to handheld devices? - answersElectronic Tracking
Loss of Device
Theft of Device
Bluetooth Technology is susceptible to general wireless networking threats, such as
denial of service, eavesdropping, man-in-the-middle attacks, and message modification
- answersTrue
An agency holding multiple warrants on the same subject may enter each warrant
separately into the FCIC/NCIC Wanted Person File - answersFALSE
Operators should query record information before entering it to see if it is already in the
system - answersTrue
A __________ is performed to remove a record if the agency determines the
information is unfounded, a false report, an erroneous entry or not valid in any way -
answersCancel
The National Insurance Crime Bureau (NICB) provides an international database
containing information on - answersVehicles
NCIC will send a $.K message 72 hours after the entry of a - answersPerson with
Information
During Hit Confirmation, operators must review the ___________ field for an alternate
hit confirmation ORI - answersMiscellaneous (MIS)
When entering a record the Miscellaneous Field is used to provide additional data to
describe the record entry, beyond the available fields on the entry form, to increase the
likelihood of the record being found and recovered - answersTrue
Guns can be entered using the model number as the serial number - answersFalse