CJIS Recertification Test Review
For personnel with access to CJI, screening requirements must include _______ and
_______ record checks. - ANS-State of residency; National fingerprint-based
Which of the following contains CHRI and is considered to be a restricted file? -
ANS-National Sex Offender Registry Files
Information system devices should be positioned so that anyone can view them. -
ANS-false
Which of the following individual user responsibilities is correct? - ANS-Users should
face computer monitors away from outside windows, doors, or hallways
Security and Privacy Literacy Training must be taken at the following time(s) - ANS-All
of these are correct
Security incidents are always very obvious. - ANS-false
Multi-factor authentication requires the use of: - ANS-Two or more different factors to
achieve authentication
Remote access may be permitted for privileged functions: - ANS-Only for compelling
operational needs
Access to controlled areas containing systems/components that access CJI should be: -
ANS-limited to only those personnel authorized by the agency to access or view CJI
Unauthorized requests, receipt, release, interception, dissemination, or discussion of
CJI is serious and may result in: - ANS-All of these are correct
The perimeter of the area requiring physical security should be prominently posted. -
ANS-True
If electronic media cannot be physically destroyed, it must be _______ to prevent
unauthorized access to previously stored data. - ANS-Overwritten at least three times
For personnel with access to CJI, screening requirements must include _______ and
_______ record checks. - ANS-State of residency; National fingerprint-based
Which of the following contains CHRI and is considered to be a restricted file? -
ANS-National Sex Offender Registry Files
Information system devices should be positioned so that anyone can view them. -
ANS-false
Which of the following individual user responsibilities is correct? - ANS-Users should
face computer monitors away from outside windows, doors, or hallways
Security and Privacy Literacy Training must be taken at the following time(s) - ANS-All
of these are correct
Security incidents are always very obvious. - ANS-false
Multi-factor authentication requires the use of: - ANS-Two or more different factors to
achieve authentication
Remote access may be permitted for privileged functions: - ANS-Only for compelling
operational needs
Access to controlled areas containing systems/components that access CJI should be: -
ANS-limited to only those personnel authorized by the agency to access or view CJI
Unauthorized requests, receipt, release, interception, dissemination, or discussion of
CJI is serious and may result in: - ANS-All of these are correct
The perimeter of the area requiring physical security should be prominently posted. -
ANS-True
If electronic media cannot be physically destroyed, it must be _______ to prevent
unauthorized access to previously stored data. - ANS-Overwritten at least three times