All training records must be kept current and be maintained for a
minimum of three years.
True
False
True
_______ is a digital form of social engineering that uses authentic-
looking emails to trick users into sharing personal information.
Trolling
Meming
Hacking
Phishing
Phishing
A server connected to a power source without a surge protector or
backup power supply is an example of a natural security
vulnerability.
True
False
True
Upon termination of personnel, the agency may allow the user to
continue accessing any local agency systems which can access CJI
for up to 90 days.
True
False
False
All users should be trained in identifying and reporting suspicious
activities from external and internal sources.
, True
False
True
Which of the following is a required security measure for
controlled areas designated for the purpose of day-to-day CJI
access or storage?
Follow the encryption requirements in the CJIS Security Policy
for CJI data at rest
Lock the area, room, or storage container when unattended
Store hard copies containing CJI in such a manner as to prevent
unauthorized or inadvertent access
All of these are correct
All are correct
he security principle of _______ is where individuals are granted
only the most restrictive set of access privileges required to
perform their official duties.
Unrestricted access
First come, first serve
Least privilege
Limited government
least privilege
An automatic device lock--such as a screensaver with a password-
-is not required if:
The device is part of an enclosed mobile vehicle used for the
purposes of criminal justice activities
The device is in a publicly accessible area
The device belongs to the President of the United States
The device is used by more than one person
The device is part of an enclosed mobile vehicle used for the purposes
of criminal justice activities