ACCURATE ANSWERS
1. What key information is included in the Vehicle/Vessel Registration
database?
License plate number of all vehicles or vessel CF number
Previous owners of the vehicle
Social Security number of the owner
Insurance policy number of the vehicle
2. If a law enforcement officer accidentally introduces a computer virus into
a system while accessing it without proper authorization, which legal
provision would they potentially violate?
PC 502(c)(6)
PC 502(c)(8)
PC 502(c)(1)
PC 502(c)(3)
3. If a law enforcement officer accesses a criminal database without proper
authorization and alters a record, which legal provision would they be
violating?
PC 502(c)(4)
PC 502(c)(1)
PC 502(c)(2)
PC 502(c)(3)
,4. Which system is part of the Criminal Justice Information Systems (CJIS)
related to stolen vehicles?
, Automated Boat System
Automated Property System
Automated Firearms System
Stolen Vehicle System
5. Describe the role of the Stolen Vehicle System within the CJIS framework.
The Stolen Vehicle System handles property tax records.
The Stolen Vehicle System manages firearm registrations.
The Stolen Vehicle System helps law enforcement track and
recover stolen vehicles.
The Stolen Vehicle System monitors boat registrations.
6. If a law enforcement officer needs to verify the ownership of a vehicle
involved in a crime, which database should they consult and what
specific information would they look for?
Criminal Justice Information Systems; they would look for the
criminal history of the owner.
Vehicle/Vessel Registration database; they would look for the
license plate number and the name of the registered owner.
International Registration Plan; they would look for the vehicle's
registration status.
Insurance database; they would look for the insurance policy
details.
7. What are the key pieces of information required for an inquiry into the
Master Name index?
Name, Criminal Record, Employment Status
Name, Address, Phone Number
, Name, Sex, Date of Birth, Age
Date of Birth, Age, Criminal Record
8. What is the specific Penal Code that addresses unauthorized access to
computer data?
PC 503(a)
PC 504(b)
PC 505(c)
PC 502(c)(2)
9. Describe what is meant by 'suspicious circumstances' in the context of
missing persons.
Suspicious circumstances indicate a person is missing due to
natural causes.
Suspicious circumstances are when a person is missing but is
expected to return soon.
Suspicious circumstances refer to situations where a person
goes missing under conditions that raise concerns about their
safety or potential foul play.
Suspicious circumstances involve only cases of stranger
abduction.
10. Describe the legal implications of knowingly possessing CORI without
authorization.
It is only a civil offense.
There are no legal implications for unauthorized possession of
CORI.
It is a felony under federal law.
, Possessing CORI without authorization is considered a
misdemeanor under state law, specifically PC 11143.
11. Describe the roles of sworn and non-sworn law enforcement personnel
in relation to accessing criminal records.
Both sworn and non-sworn personnel have the same level of
access.
Non-sworn personnel cannot access any records.
Only sworn personnel can access criminal records without
restrictions.
Sworn LE personnel have official authority, while non-sworn LE
personnel assist in accessing records under specific guidelines.
12. If a law enforcement officer accesses a computer system without proper
authorization, what legal provision could they potentially violate?
PC 502(c)(5)
PC 502(c)(1)
PC 502(c)(3)
PC 502(c)(7)
13. What does PC 502(c)(7) specifically address regarding unauthorized
access?
Disrupting services of a computer network.
Introducing contaminants to a computer system.
Accessing or causing to be accessed any computer, computer
system, or computer network without permission.
Unauthorized access to criminal records.
, 14. In the language of policing, non-sworn personnel are:
discretionary officers
peace officers
sheriffs
civilians
15. Describe the significance of using name and sex as criteria for inquiries
into WPS.
Name and sex are used for demographic analysis only.
Using name and sex helps to accurately identify individuals in
the system.
These criteria are used to categorize offenses.
Name and sex are irrelevant for inquiries.
16. Interpret the implications of PC 502(c)(8) regarding unauthorized access
to computer systems.
PC 502(c)(8) allows for authorized personnel to access any
computer system freely.
PC 502(c)(8) only applies to physical access to computer systems.
PC 502(c)(8) implies that unauthorized access and the
introduction of contaminants can lead to legal consequences.
PC 502(c)(8) does not address the introduction of contaminants.
17. If a law enforcement officer accidentally shares CORI with a journalist
who does not have authorization, what legal consequences could the
officer face under Penal Code 11142?
The officer could be charged with a misdemeanor for
unlawfully furnishing CORI to an unauthorized person.