100% Solved
______ are two of the most common methods of destroying FBI CJIS data/CHRI. - ✔✔✔-
Shredding and buring
______ will determine who is authorized for access to areas containing sensitive
devises/data/systems. - ✔✔✔-Each agency
"YQ" is used to run a criminal history inqiury. - ✔✔✔-False
"YQ" is used to run a criminal history inquiry. - ✔✔✔-False
A 'DNQ' inquiry is used to check a state's driver's license file by a 'date of birth' when an exact
name is unknown. - ✔✔✔-False
A 'HIT' in NCIC is described as what? - ✔✔✔-A positive response in which the person or
property inquired upon matches the information contained in the response.
A 'QH' summary response to a criminal history query is a detailed listing of an offender's
criminal history. - ✔✔✔-False
A 'QPO" inquiry searches the 'Protection Order File' and retrieves active, expired or cleared
records. - ✔✔✔-True
A 'SQ' inquiry is used to determine is a snowmobile registration information exists in a state. -
✔✔✔-True
A "QW" with and EBS of "1" will search for a one year range of time from the date of birth in the
query transaction submitted. - ✔✔✔-False
,TCIC-TLETS Mobile Access RE-Certification Exam with Questions and Answers –
100% Solved
A cross search of the 'Missing Person' and 'Unidentified Person' files are initiated when a record
is _____ or ______ in either file. - ✔✔✔-Entered / Modified
A DQ (drivers license query) made using a drivers license will automatically generate a NCIC
check. - ✔✔✔-False
A DQ (drivers license query) may be made by entering what data? - ✔✔✔-All of the Above
A DQ (drivers lisence inquery) made using a drivers license will automatically generate a NCIC
check. - ✔✔✔-False
A driver license inquiry made by Operator License Number will automatically generate an NCIC
Check. - ✔✔✔-False
A driver license photo can be used as an NCIC Image in a wanted person file. - ✔✔✔-True
A driver license photo can be used as an NCIC Image in a wasted person file. - ✔✔✔-True
A Formal Message contains five distinct parts: - ✔✔✔-All of the Above
A gun query can be accomplished by running the SER (serial number) alone. - ✔✔✔-True
A III check may be made on anyone seeking employment with the Water Department or Fire
Department. - ✔✔✔-False
A Locate is used: - ✔✔✔-To show the person has been apprehended or the property has been
located
, TCIC-TLETS Mobile Access RE-Certification Exam with Questions and Answers –
100% Solved
A military recruiter is authorized to access Computerized Criminal History files via TLETS. -
✔✔✔-False
A QND inquiry into the National Denied Transaction File (NDTF) may be made by name and one,
more than one of all of the following alphanumeric identifiers: DOB, MNU and SOC - ✔✔✔-True
A query sent to the NCIC Vehicle File search will search which of the NCIC files? - ✔✔✔-NCIS
Vehicle & Boat Files
A query sent to the NCIC Vehicle File will search which of the NCIC files? - ✔✔✔-NCIC Vehicle &
Boat Files
A QV/ZV transaction will search which of the following? - ✔✔✔-All of the Above
A response from INTERPOL containing the phrase TOO_MANY_ANSWERS is usually received on
inquiries having the following criteria: - ✔✔✔-All of the Above
A stolen boat trailer is entered in the? - ✔✔✔-Vehicle file
A stolen vehicle inquiry (QV) may result in response from Wanted Person or Missing Person
records entered in NCIC. - ✔✔✔-True
A stolen vehicle inquiry (QV) may result in responses from Wanted Person records entered in
NCIC. - ✔✔✔-True
A stolen vehicle inquiry using QV or ZV will search which of the following: - ✔✔✔-All of the
Above