For personnel with access to CJI, screening requirements must include _______ and
_______ record checks. - Answ State of residency; National fingerprint-based
Which of the following contains CHRI and is considered to be a restricted file? - Answ
National Sex Offender Registry Files
Information system devices should be positioned so that anyone can view them. - Answ
false
Which of the following individual user responsibilities is correct? - Answ Users should
face computer monitors away from outside windows, doors, or hallways
Security and Privacy Literacy Training must be taken at the following time(s) - Answ
All of these are correct
Security incidents are always very obvious. - Answ false
Multi-factor authentication requires the use of: - Answ Two or more different factors to
achieve authentication
Remote access may be permitted for privileged functions: - Answ Only for compelling
operational needs
Access to controlled areas containing systems/components that access CJI should be:
- Answ limited to only those personnel authorized by the agency to access or view CJI
Unauthorized requests, receipt, release, interception, dissemination, or discussion of
CJI is serious and may result in: - Answ All of these are correct
The perimeter of the area requiring physical security should be prominently posted. -
Answ True
If electronic media cannot be physically destroyed, it must be _______ to prevent
unauthorized access to previously stored data. - Answ Overwritten at least three times
The security principle of _______ is where individuals are granted only the most
restrictive set of access privileges required to perform their official duties. - Answ
Least privilege
All training records must be kept current and be maintained for a minimum of three
years. - Answ True