____ is sensitive data and unauthorized use could result in
criminal prosecution or termination of employment. Correct
Answers chri
A mugshot can be added to an NCIC missing person Correct
Answers true
A query sent to the NCIC Article File will search which of the
NCIC files? Correct Answers Only the Article File
A query sent to the NCIC Vehicle File will search which of the
NCIC files? Correct Answers The NCIC Vehicle and NCIC
Boat Files
A record for a missing person who is under the age of 21 should
be entered into NCIC within24 hours of receipt of the minimum
date Correct Answers true
A search of the NCIC Vehicle File by VIN, may produce
records (hits) on property that may not be an exact match with
the VIN due to partial VIN Correct Answers true
A security incident is a violation or attempted violation of the
FBI CJIS Security Policy or other security policy that would
threaten the confidentiality, integrity or availability of FBI or
State CJI data. Correct Answers true
A security incident shall be reported to the CJIS Systems
Agency's (CSA's) Information Security Officer (ISO) and
, include the following information: date of the incident,
location(s) of incident, systems affected, method of detection,
nature of the incident, description of the incident, actions
taken/resolution, date and contact information for the agency.
Correct Answers true
Access to and use of FBI CJI is only for: Correct Answers
Criminal justice or authorized civil purposes only.
According to many security experts, which group constitutes the
biggest threat: Correct Answers The agency's own personal
According to NCIC security policy, Interstate Identification
Index (III) record details may be transmitted at any time on an
agency's radio. Correct Answers false
Agencies accessing information via OLETS may release any
information to the general public. Correct Answers false
All data accessed vis OLETS is doccumented information and
access to that data is restricted to duly authorized law
enforcement and criminal justice agencies. Correct Answers
true
All persons who have access to CJI are required to have security
training within ___ months of assignment. Correct Answers 6
An audit trail must be established for any dissemination of triple
I Correct Answers true