Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CJIS RECERTIFICATION TEST 100 QUESTIONS WITH CORRECT ANSWERS

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
04-04-2026
Written in
2025/2026

CJIS RECERTIFICATION TEST 100 QUESTIONS WITH CORRECT ANSWERS Security and Privacy Literacy Training must be taken at the following time(s) - answer- of these are correct Security incidents are always very obvious. - answer- Multi-factor authentication requires the use of: - answer- false All Two or more different factors to achieve authentication For personnel with access to CJI, screening requirements must include _______ and _______ record checks. - answer- State of residency; National fingerprint-based Which of the following contains CHRI and is considered to be a restricted file? - answer National Sex Offender Registry Files Information system devices should be positioned so that anyone can view them. - answer false

Show more Read less
Institution
CJIS RECERTIFICATION
Course
CJIS RECERTIFICATION

Content preview

CJIS RECERTIFICATION TEST
100 QUESTIONS WITH
CORRECT ANSWERS


Security and Privacy Literacy Training must be taken at the following time(s) - answer- All
of these are correct



Security incidents are always very obvious. - answer- false



Multi-factor authentication requires the use of: - answer- Two or more different factors to
achieve authentication



For personnel with access to CJI, screening requirements must include _______ and _______
record checks. - answer- State of residency; National fingerprint-based



Which of the following contains CHRI and is considered to be a restricted file? - answer-
National Sex Offender Registry Files



Information system devices should be positioned so that anyone can view them. - answer-
false



Which of the following individual user responsibilities is correct? - answer- Users should
face computer monitors away from outside windows, doors, or hallways

,Remote access may be permitted for privileged functions: - answer- Only for compelling
operational needs




The FBI authorized originating agency identifier (ORI) must be used in each transaction on CJIS
systems. - answer- True



Authorized criminal justice purposes for the use of CJI include: - answer- All of these are
correct



A security incident is a violation of the CJIS Security Policy that threatens the confidentiality,
integrity, or availability of CJI. - answer- True



A commonly used type of social engineering is: - answer- All of these are correct



Encryption is: - answer- The process of converting information or data into a code to
prevent unauthorized access



Access to and use of CJI and CHRI is for: - answer- Criminal justice purposes and
authorized noncriminal justice functions only



An authentication factor is: - answer- All of these are correct



CJI can include which of the following types of data? - answer- All of these are correct



The security principle of _______ is the division of roles and responsibilities so that different
individuals perform each function related to administrative duties.

, Herding cats

Separation of duties

Organization

Teamwork - answer- Separation of duties



Access to controlled areas containing systems/components that access CJI should be:

limited to employees of the agency

limited to sworn officers only

limited to only those personnel authorized by the agency to access or view CJI

unlimited - answer- limited to only those personnel authorized by the agency to access or
view CJI



Access to controlled areas containing systems/components that access CJI should be: - answer-
limited to only those personnel authorized by the agency to access or view CJI



Unauthorized requests, receipt, release, interception, dissemination, or discussion of CJI is
serious and may result in: - answer- All of these are correct



The perimeter of the area requiring physical security should be prominently posted. - answer-
True



If electronic media cannot be physically destroyed, it must be _______ to prevent unauthorized
access to previously stored data. - answer- Overwritten at least three times



The security principle of _______ is where individuals are granted only the most restrictive set
of access privileges required to perform their official duties. - answer- Least privilege

Written for

Institution
CJIS RECERTIFICATION
Course
CJIS RECERTIFICATION

Document information

Uploaded on
April 4, 2026
Number of pages
16
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$24.39
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
munenenjeri37
5.0
(1)

Get to know the seller

Seller avatar
munenenjeri37 Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 month
Number of followers
0
Documents
355
Last sold
2 weeks ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions