Question 1:
To verify identification, state of residency, and national fingerprint-based record checks shall be
conducted __________ to CJI for all personnel who have unescorted access to unencrypted CJI
or unescorted access to physically secure locations or controlled areas.
A) Prior to granting access
B) Within 24 hours upon initial employment or assignment
C) Within 6 months upon initial employment or assignment
D) Within 60 days upon initial employment or assignment
Answer: A) Prior to granting access
Question 2:
Information system devices should be placed in a manner that restricts visibility to unauthorized
personnel.
True
False
Answer: True
Question 3:
Computer monitors should face away from door or cubicle entryways to avoid the allowance of
__________.
Answer: Unauthorized individuals viewing sensitive data.
Question 4:
When is it mandatory for personnel to complete Security and Privacy Literacy Training?
A) Upon initial access to CJI
B) Annually thereafter
C) Whenever there is a significant policy change
D) All of these are correct
Answer: D) All of these are correct
Question 5:
What does the implementation of Multi-Factor Authentication (MFA) require?
A) At least two identity components to authenticate a user's identity
, B) Only one form of user identification
C) An unsecured authentication process
D) The use of easily guessed passwords
Answer: A) At least two identity components to authenticate a user's identity
Question 6:
Under what circumstances is remote access to Criminal Justice Information (CJI) considered
acceptable?
A) When it is convenient for the user
B) Only for compelling operational needs
C) Whenever the user requests it
D) For routine administrative tasks
Answer: B) Only for compelling operational needs
Question 7:
Who should be granted access to secure areas where Criminal Justice Information (CJI) is
processed or stored?
A) All employees of the agency
B) Only personnel with explicit authorization
C) Any contractor working with the agency
D) Visitors with a valid ID
Answer: B) Only personnel with explicit authorization
Question 8:
What are the potential consequences of mishandling Criminal Justice Information (CJI) through
unauthorized access or sharing?
A) Legal penalties and disciplinary action
B) Loss of access privileges to CJI systems
C) Damage to the agency's reputation
D) All of these are correct
Answer: D) All of these are correct
Question 9:
Is it necessary for areas that require physical security to have clear signage indicating restricted
access?
A) Yes, to inform unauthorized individuals
B) No, signage is not required
C) Only if the area is monitored