CJIS Security Awareness
A security incident is a violation or possible violation of the technical aspects of the CJIS
security policy that threaten the confidentiality, integrity, or availability of CJI. - ANS-True
To verify the identification, a _________________________________________ shall
be conducted for all personnel that have access to FBI CJIS Systems. - ANS-state of
residency and national fingerprint based check
Training for appropriate personnel would include vendors who develop software for
NCIC access. - ANS-True
Agencies should challenge strangers or report unusual activity around CJI. - ANS-True
Unauthorized requests, receipt, release, interception, dissemination or discussion of FBI
CJI data could result in criminal prosecution and/or termination of employment. -
ANS-True
Agencies are not required to maintain an up-to-date network diagram for review and
audit purposes. - ANS-False
A common form of social engineering is someone pretending to be an authorized user
or administrator in an attempt to gain illicit access to protected data. - ANS-True
It is important to ensure users have a right to know and need to know before they have
access to CJI Data. - ANS-True
Security incident indicators that deserve special attention from users and/or system
administrators include: - ANS-All of the Above
Custodial workers that access the terminal area must have a fingerprint background
check done and training unless they are escorted in these areas. - ANS-True
Users should activate password protected screen saver programs or lock the computer
when they temporarily step away from the computer. - ANS-True
All computers accessing FBI CJI data must have antivirus, anti-SPAM and anti-spyware
software installed and regularly updated - ANS-True
A security incident is a violation or possible violation of the technical aspects of the CJIS
security policy that threaten the confidentiality, integrity, or availability of CJI. - ANS-True
To verify the identification, a _________________________________________ shall
be conducted for all personnel that have access to FBI CJIS Systems. - ANS-state of
residency and national fingerprint based check
Training for appropriate personnel would include vendors who develop software for
NCIC access. - ANS-True
Agencies should challenge strangers or report unusual activity around CJI. - ANS-True
Unauthorized requests, receipt, release, interception, dissemination or discussion of FBI
CJI data could result in criminal prosecution and/or termination of employment. -
ANS-True
Agencies are not required to maintain an up-to-date network diagram for review and
audit purposes. - ANS-False
A common form of social engineering is someone pretending to be an authorized user
or administrator in an attempt to gain illicit access to protected data. - ANS-True
It is important to ensure users have a right to know and need to know before they have
access to CJI Data. - ANS-True
Security incident indicators that deserve special attention from users and/or system
administrators include: - ANS-All of the Above
Custodial workers that access the terminal area must have a fingerprint background
check done and training unless they are escorted in these areas. - ANS-True
Users should activate password protected screen saver programs or lock the computer
when they temporarily step away from the computer. - ANS-True
All computers accessing FBI CJI data must have antivirus, anti-SPAM and anti-spyware
software installed and regularly updated - ANS-True