A security incident is a violation or possible violation of the technical aspects of the CJIS
security policy that threaten the confidentiality, integrity, or availability of CJI. -
ANSWER True
To verify the identification, a _________________________________________ shall
be conducted for all personnel that have access to FBI CJIS Systems. - ANSWER state
of residency and national fingerprint based check
Training for appropriate personnel would include vendors who develop software for
NCIC access. - ANSWER True
Agencies should challenge strangers or report unusual activity around CJI. - ANSWER
True
Unauthorized requests, receipt, release, interception, dissemination or discussion of FBI
CJI data could result in criminal prosecution and/or termination of employment. -
ANSWER True
Agencies are not required to maintain an up-to-date network diagram for review and
audit purposes. - ANSWER False
A common form of social engineering is someone pretending to be an authorized user
or administrator in an attempt to gain illicit access to protected data. - ANSWER True
It is important to ensure users have a right to know and need to know before they have
access to CJI Data. - ANSWER True
Security incident indicators that deserve special attention from users and/or system
administrators include: - ANSWER All of the Above
Advanced authentication does not have to be used on mobile devices. - ANSWER
False
Personal Identifiable Information (PII) shall be extracted from CJI for the purpose of
official business only. - ANSWER True
Turning off the monitor constitutes a sufficient security precaution during a break. -
ANSWER False
Some users, such as a chief or sheriff, do not have to be authenticated with a unique
user ID and password to access CJI. - ANSWER False