100 QUESTIONS WITH
CORRECT ANSWERS
Security and Privacy Literacy Training must be taken at the following time(s) - answer- All
of these are correct
Security incidents are always very obvious. - answer- false
Multi-factor authentication requires the use of: - answer- Two or more different factors to
achieve authentication
For personnel with access to CJI, screening requirements must include _______ and _______
record checks. - answer- State of residency; National fingerprint-based
Which of the following contains CHRI and is considered to be a restricted file? - answer-
National Sex Offender Registry Files
Information system devices should be positioned so that anyone can view them. - answer-
false
Which of the following individual user responsibilities is correct? - answer- Users should
face computer monitors away from outside windows, doors, or hallways
,Remote access may be permitted for privileged functions: - answer- Only for compelling
operational needs
The FBI authorized originating agency identifier (ORI) must be used in each transaction on CJIS
systems. - answer- True
Authorized criminal justice purposes for the use of CJI include: - answer- All of these are
correct
A security incident is a violation of the CJIS Security Policy that threatens the confidentiality,
integrity, or availability of CJI. - answer- True
A commonly used type of social engineering is: - answer- All of these are correct
Encryption is: - answer- The process of converting information or data into a code to
prevent unauthorized access
Access to and use of CJI and CHRI is for: - answer- Criminal justice purposes and
authorized noncriminal justice functions only
An authentication factor is: - answer- All of these are correct
CJI can include which of the following types of data? - answer- All of these are correct
The security principle of _______ is the division of roles and responsibilities so that different
individuals perform each function related to administrative duties.
, Herding cats
Separation of duties
Organization
Teamwork - answer- Separation of duties
Access to controlled areas containing systems/components that access CJI should be:
limited to employees of the agency
limited to sworn officers only
limited to only those personnel authorized by the agency to access or view CJI
unlimited - answer- limited to only those personnel authorized by the agency to access or
view CJI
Access to controlled areas containing systems/components that access CJI should be: - answer-
limited to only those personnel authorized by the agency to access or view CJI
Unauthorized requests, receipt, release, interception, dissemination, or discussion of CJI is
serious and may result in: - answer- All of these are correct
The perimeter of the area requiring physical security should be prominently posted. - answer-
True
If electronic media cannot be physically destroyed, it must be _______ to prevent unauthorized
access to previously stored data. - answer- Overwritten at least three times
The security principle of _______ is where individuals are granted only the most restrictive set
of access privileges required to perform their official duties. - answer- Least privilege