A normally used sort of social engineering is: - ANS-All of those are correct
A protection incident is a contravention of the CJIS Security Policy that threatens the
confidentiality, integrity, or availability of CJI. - ANS-True
Access to and use of CJI and CHRI is for: - ANS-Criminal justice functions and authorized
noncriminal justice features best
Access to controlled regions containing structures/components that get admission to CJI have
to be: - ANS-restricted to best the ones employees authorized through the organisation to get
right of entry to or view CJI
After the initial education, how frequently should Security and Privacy Training be finished? -
ANS-Every yr
All schooling records ought to be saved contemporary and be maintained for at least three
years. - ANS-True
An authentication element is: - ANS-All of those are accurate
An instance of a probable danger to safety and privateness is a person by chance erasing a
critical file even as "gambling" at the computer. - ANS-True
Any incidents or uncommon interest should be said in your business enterprise contact, LASO,
or Information Security Officer right away. - ANS-True
Authorized criminal justice functions for using CJI encompass: - ANS-All of these are accurate
CJI can consist of which of the following types of records? - ANS-All of those are correct
Encryption is: - ANS-The method of converting data or facts right into a code to prevent
unauthorized get entry to
For personnel with get entry to to CJI, screening requirements should include _______ and
_______ document checks. - ANS-State of residency; National fingerprint-primarily based
If digital media cannot be bodily destroyed, it should be _______ to prevent unauthorized get
admission to to formerly saved statistics. - ANS-Overwritten at the least 3 instances
Information system gadgets should be placed so that all people can view them. - ANS-fake