(LATEST) CJIS RECERTIFICATION TEST QUESTIONS AND
ALL ANSWERS CORRECT
1. The following is an illustration of a security incident indicator: ANSWER An
account with little to no activity for months suddenly has a lot of activity.
You should notify your agency contact, LASO, or information security officer
immediately of any occurrences or suspicious behaviour. ANSWER True
The following are the only reasons to access and use CJI and CHRI: ANSWER
Criminal justice purposes and approved noncriminal justice duties
1. Information posted on personal social media profiles is not required to be
covered by organisational policy. ANSWER Untrue
What kind of information ought to be in a security incident report? ANSWER:
These are all accurate.
The division of tasks and responsibilities so that various people carry out each
administrative task is the security principle of _______. ANSWER Division of
labour
Which of the following is regarded as a restricted file and contains CHRI?
National Sex Offender Registry Files (ANSWER)
A program that is secretly injected into another program with the intention of
jeopardizing the confidentiality, integrity, or availability of the data is referred
to as malicious code, or _______. Malware for Answers
The physically secure area should always be watched over and accompanied by
visitors. ANSWER True
ANSWER True: Data retrieved from the III system must be utilized for the
SAME approved purpose for which it was sought.
ALL ANSWERS CORRECT
1. The following is an illustration of a security incident indicator: ANSWER An
account with little to no activity for months suddenly has a lot of activity.
You should notify your agency contact, LASO, or information security officer
immediately of any occurrences or suspicious behaviour. ANSWER True
The following are the only reasons to access and use CJI and CHRI: ANSWER
Criminal justice purposes and approved noncriminal justice duties
1. Information posted on personal social media profiles is not required to be
covered by organisational policy. ANSWER Untrue
What kind of information ought to be in a security incident report? ANSWER:
These are all accurate.
The division of tasks and responsibilities so that various people carry out each
administrative task is the security principle of _______. ANSWER Division of
labour
Which of the following is regarded as a restricted file and contains CHRI?
National Sex Offender Registry Files (ANSWER)
A program that is secretly injected into another program with the intention of
jeopardizing the confidentiality, integrity, or availability of the data is referred
to as malicious code, or _______. Malware for Answers
The physically secure area should always be watched over and accompanied by
visitors. ANSWER True
ANSWER True: Data retrieved from the III system must be utilized for the
SAME approved purpose for which it was sought.