QUESTIONS WITH ANSWERS GRADED A+
✔✔What transaction code would you use to search the NICS Denied Transaction File? -
✔✔QND
✔✔There are eight Nlets regions throughout the United State - ✔✔True
✔✔Transaction _____________ is used to obtain a Texas CCH and/or check for the
existence of a criminal history in ________ - participating states - ✔✔QH, III
✔✔Users shall not share passwords or leave passwords in conspicuous location (under
the key board, posted on the monitor, under the mouse pad, in/on the desk, etc.). -
✔✔True
✔✔The TLETS Continuity of Care transaction automates the manual exchange of
mental health status information between: - ✔✔Jails and the Local Mental Authorities
(LMHA)
✔✔When you receive a $.E Serious Error message from the FBI/NCIC, it menas the
record has been: - ✔✔Canceled
✔✔The NICS Denied Transaction Query (QND) will return any records of individuals
who habe been denied, but is not restricted by the date of denial. - ✔✔True
✔✔The Continuity of Care response will always contain only one potential match -
✔✔False
✔✔If fingerprints were submitted, but rejected by the FBI, and the subject is never
reprinted for that arrest, that arrest information would NOT appear in III - ✔✔True
✔✔There is standardized order when describing vehicles and persons in administrative
messages. When information is not known, omit without comment - ✔✔True
✔✔The reason that the manual process has been changed is: - ✔✔To expedite the
process for identifying special needs offenders
✔✔How many images can be associated with a NCIC person file record? - ✔✔12
✔✔The license plate reader system does not provide: - ✔✔Vehicle Owner Name
✔✔A theft status on an INTERPOL travel document inquiry indicates the reason why
the document is in the INTERPOL database - ✔✔True
, ✔✔The record holding country man contact INTERPOL and request the reason for your
inquiry - ✔✔True
✔✔Which of the following statements in/are correct concerning NCIC data? - ✔✔All of
the Above
✔✔What transaction is used when checking n airplane to see if it is stolen? - ✔✔(QV)
Query Vehicle
✔✔If you have two warrants for a subject, one for criminal homicide and another for
motor vehicle theft, how would you handle the entry? - ✔✔Enter only the most serious
warrant into the system and note the other warrant in the Miscellaneous (MIS) filed
✔✔Continuity of Care guidelines for the communication between the Local Mental
Health Authority and a county jail is managed by the local county court - ✔✔False
✔✔It has been determined an agency has obtained III data and misused it. Who could
be held responsible? - ✔✔All of the Above
✔✔The individual receiving a request for criminal justice information must ensure that
the person requesting the information is: - ✔✔Authorized to receive the data
✔✔When an agency finds a a vehicle abandoned, an entry should be made into the
TCIC Stored/Abandoned Vehicle file if the: - ✔✔Owner cannot be located, there is no
stolen record on file, and the vehicle is impounded
✔✔Using the definition of administration of criminal justice, a county animal control unit
is recognized as criminal justice agency - ✔✔False
✔✔To inquire the lost gun file in NCIC, use transaction 'QG' - ✔✔True
✔✔FBI CJIS data/CHRI must be safeguarded to prevent: - ✔✔All of the Above
✔✔A 'QPO' inquiry searches the 'Protection Order File' and retrieves active expired or
cleared records: - ✔✔True
✔✔Improper use of CCH information by an individual at a law enforcement agency or
department may result in administrative sanctions or criminal penalities - ✔✔True
✔✔Information available throughout Nlets is controlled by _______________. -
✔✔Contributing state and federal agencies