CJIS Security Awareness Exam with Correct
Answers
Save
Practice questions for this set
Learn Study with Learn
spyware software installed and regularly updated
Choose an answer
2 False
Don't know?
Terms in this set (25)
, A security incident is a True
violation or possible
violation of the technical
aspects of the CJIS
security policy that
threaten the
confidentiality, integrity, or
availability of CJI.
To verify the identification, state of residency and national fingerprint based
a check
_____________________________________
____ shall be conducted for
all personnel that have
access to FBI CJIS
Systems.
Training for appropriate True
personnel would include
vendors who develop
software for NCIC access.
Agencies should True
challenge strangers or
report unusual activity
around CJI.
Unauthorized requests, True
receipt, release,
interception, dissemination
or discussion of FBI CJI
data could result in
criminal prosecution
and/or termination of
employment.
Answers
Save
Practice questions for this set
Learn Study with Learn
spyware software installed and regularly updated
Choose an answer
2 False
Don't know?
Terms in this set (25)
, A security incident is a True
violation or possible
violation of the technical
aspects of the CJIS
security policy that
threaten the
confidentiality, integrity, or
availability of CJI.
To verify the identification, state of residency and national fingerprint based
a check
_____________________________________
____ shall be conducted for
all personnel that have
access to FBI CJIS
Systems.
Training for appropriate True
personnel would include
vendors who develop
software for NCIC access.
Agencies should True
challenge strangers or
report unusual activity
around CJI.
Unauthorized requests, True
receipt, release,
interception, dissemination
or discussion of FBI CJI
data could result in
criminal prosecution
and/or termination of
employment.