TCIC/TLETS Full Access with CCH Recertification Test
Study online at https://quizlet.com/_e8ktyw
1. True or False: Using the definition of administration of False
criminal justice, a county animal control unit is recog-
nized as criminal justice agency.
2. The individual receiving a request for criminal justice Authorized to receive the
information must ensure that the person requesting data
the information is:
3. What transaction code would you use to search NICS QND
Denied Transaction File?
4. True or False: It is permissible to copy a response from False
INTERPOL and email it unencrypted to another agency.
5. True or False: The National Instant Criminal Back- True
ground Check System (NICS) is used by Federal
Firearms Licenses to Instantly determine whether a
perspective buy is eligible to by firearms.
6. Driver license photos are: - Protected by both state
and federal laws.
- Only for criminal justice
purposes.
7. When sending a Criminal History Full Record Query State Identification Num-
'FQ' to an individual state repository, along with the ber
destination code, attention and reason to inquiry
fields, what other field is required?
8. The computer site and/or terminal area must have ad- In a secure location to
equate physical security to protect against any unau- which only authorized per-
thorized personnel gaining access to the computer sonnel have access.
equipment or to any of the stored data. To protect
1/9
, TCIC/TLETS Full Access with CCH Recertification Test
Study online at https://quizlet.com/_e8ktyw
against unauthorized access the terminal must be lo-
cated:
9. Terminals must be in locations that are secured from True
unauthorized access.
10. The FBI's CJIS Security Policy provides a procedure for Prior to access of the sys-
conducting national fingerprint-based record checks tem
on personnel having access to FBI Criminal Justice In-
formation Systems:
11. Unauthorized request or receipt of NCIC material True
could result in administrative or criminal proceedings
brought against the agencies and/or the individuals
involved.
12. A vehicle is any motor-driven conveyance (except a True
boat) designed to carry its operator. Included in this
definition are aircrafts and trailers.
13. The Threat Against Peace or Detention Officer file is an False
NCIC only file.
14. NCIC operates under shared management between FBI, CJIS Systems Agency
the __________ and the ___________ in each state. (CSA)
15. The National Vehicle Service has a repository of Li- - Towing, repossession
cense Plate Reader data available to the law enforce- companies and parking
ment community via NLETS gathered from lots
- Garages and toll way sys-
tems
16. Which of the following is considered a legitimate rea- None of the above
son for running a criminal history inquiry via TLETS?
2/9
Study online at https://quizlet.com/_e8ktyw
1. True or False: Using the definition of administration of False
criminal justice, a county animal control unit is recog-
nized as criminal justice agency.
2. The individual receiving a request for criminal justice Authorized to receive the
information must ensure that the person requesting data
the information is:
3. What transaction code would you use to search NICS QND
Denied Transaction File?
4. True or False: It is permissible to copy a response from False
INTERPOL and email it unencrypted to another agency.
5. True or False: The National Instant Criminal Back- True
ground Check System (NICS) is used by Federal
Firearms Licenses to Instantly determine whether a
perspective buy is eligible to by firearms.
6. Driver license photos are: - Protected by both state
and federal laws.
- Only for criminal justice
purposes.
7. When sending a Criminal History Full Record Query State Identification Num-
'FQ' to an individual state repository, along with the ber
destination code, attention and reason to inquiry
fields, what other field is required?
8. The computer site and/or terminal area must have ad- In a secure location to
equate physical security to protect against any unau- which only authorized per-
thorized personnel gaining access to the computer sonnel have access.
equipment or to any of the stored data. To protect
1/9
, TCIC/TLETS Full Access with CCH Recertification Test
Study online at https://quizlet.com/_e8ktyw
against unauthorized access the terminal must be lo-
cated:
9. Terminals must be in locations that are secured from True
unauthorized access.
10. The FBI's CJIS Security Policy provides a procedure for Prior to access of the sys-
conducting national fingerprint-based record checks tem
on personnel having access to FBI Criminal Justice In-
formation Systems:
11. Unauthorized request or receipt of NCIC material True
could result in administrative or criminal proceedings
brought against the agencies and/or the individuals
involved.
12. A vehicle is any motor-driven conveyance (except a True
boat) designed to carry its operator. Included in this
definition are aircrafts and trailers.
13. The Threat Against Peace or Detention Officer file is an False
NCIC only file.
14. NCIC operates under shared management between FBI, CJIS Systems Agency
the __________ and the ___________ in each state. (CSA)
15. The National Vehicle Service has a repository of Li- - Towing, repossession
cense Plate Reader data available to the law enforce- companies and parking
ment community via NLETS gathered from lots
- Garages and toll way sys-
tems
16. Which of the following is considered a legitimate rea- None of the above
son for running a criminal history inquiry via TLETS?
2/9