(NEWEST) CJIS RECERTIFICATION TEST QUESTIONS AND
ALL ANSWERS CORRECT
Personnel who have access to CJI must undergo _______ and _______ record
checks as part of the screening process. ANSWER residence state; Using
national fingerprints
Which of the following is regarded as a restricted file and contains CHRI?
National Sex Offender Registry Files (ANSWER)
Devices for information systems should be placed where anyone can see them. -
ANSWER false
Which of the following statements about the duties of individual users is true?
ANSWER Computer monitors should be oriented away from doors, windows,
and corridors.
Security and Privacy Literacy The following time or times must be used for
training: ANSWER All of them are accurate.
Security events are always readily apparent. - ANSWER false
The following must be used for multi-factor authentication: ANSWER To
accomplish authentication, two or more distinct factors
Remote access may be permitted for privileged functions: Only respond to
urgent operational requirements.
Only employees who have been granted permission by the agency to view or
access CJI should have access to the restricted areas that house the systems and
components that access it.
Requests, receipts, releases, interceptions, distributions, or discussions of CJI
without authorization are grave and can lead to: ANSWER These are all
accurate.
ALL ANSWERS CORRECT
Personnel who have access to CJI must undergo _______ and _______ record
checks as part of the screening process. ANSWER residence state; Using
national fingerprints
Which of the following is regarded as a restricted file and contains CHRI?
National Sex Offender Registry Files (ANSWER)
Devices for information systems should be placed where anyone can see them. -
ANSWER false
Which of the following statements about the duties of individual users is true?
ANSWER Computer monitors should be oriented away from doors, windows,
and corridors.
Security and Privacy Literacy The following time or times must be used for
training: ANSWER All of them are accurate.
Security events are always readily apparent. - ANSWER false
The following must be used for multi-factor authentication: ANSWER To
accomplish authentication, two or more distinct factors
Remote access may be permitted for privileged functions: Only respond to
urgent operational requirements.
Only employees who have been granted permission by the agency to view or
access CJI should have access to the restricted areas that house the systems and
components that access it.
Requests, receipts, releases, interceptions, distributions, or discussions of CJI
without authorization are grave and can lead to: ANSWER These are all
accurate.