Podcast
Questions and Answers
According to the policy, what standards does the Department use to govern the operation of criminal justice information systems?
According to the policy, what standards does the Department use to govern the operation of criminal justice information systems?
What is the role of the Local Agency Security Officer (LASO) according to the directive?
What is the role of the Local Agency Security Officer (LASO) according to the directive?
What does FCIC Agency Coordinator (FAC) do within the Department?
What does FCIC Agency Coordinator (FAC) do within the Department?
Which systems are mentioned in the departmental standards directive as examples of criminal justice information systems that employees may use?
Which systems are mentioned in the departmental standards directive as examples of criminal justice information systems that employees may use?
Signup and view all the answers
Who is the designated CSA for Florida according to the departmental standards directive?
Who is the designated CSA for Florida according to the departmental standards directive?
Signup and view all the answers
What is the requirement for establishing a remote access connection by employees?
What is the requirement for establishing a remote access connection by employees?
Signup and view all the answers
How is vendor remote access granted?
How is vendor remote access granted?
Signup and view all the answers
What is the procedure for granting vendor access through remote access software?
What is the procedure for granting vendor access through remote access software?
Signup and view all the answers
What is the requirement for storing servers containing criminal history information (CHI) data?
What is the requirement for storing servers containing criminal history information (CHI) data?
Signup and view all the answers
How should electronic media containing CHI be stored when not in the physical control of the user?
How should electronic media containing CHI be stored when not in the physical control of the user?
Signup and view all the answers
Who should be responsible for maintaining documentation of any security incident?
Who should be responsible for maintaining documentation of any security incident?
Signup and view all the answers
Who is responsible for administering updates and patches to Department computers?
Who is responsible for administering updates and patches to Department computers?
Signup and view all the answers
What should employees do in case of any threat to the security of NCIC/FCIC data or systems?
What should employees do in case of any threat to the security of NCIC/FCIC data or systems?
Signup and view all the answers
'Vendor support is necessary to provide updates to software and troubleshoot system problems' - True or False?
'Vendor support is necessary to provide updates to software and troubleshoot system problems' - True or False?
Signup and view all the answers
'Using personal devices for remote access connections is allowed' - True or False?
'Using personal devices for remote access connections is allowed' - True or False?
Signup and view all the answers
When should Department employees or approved IT personnel accompany all visitors to computer centers and/or workstations?
When should Department employees or approved IT personnel accompany all visitors to computer centers and/or workstations?
Signup and view all the answers
Who should complete the IT Security Incident Response Form to document security incidents?
Who should complete the IT Security Incident Response Form to document security incidents?
Signup and view all the answers
Who is required to undergo background screening as prescribed in the CJIS Security Policy?
Who is required to undergo background screening as prescribed in the CJIS Security Policy?
Signup and view all the answers
What type of training must Department employees complete to be permitted to operate computers with NCIC/FCIC access?
What type of training must Department employees complete to be permitted to operate computers with NCIC/FCIC access?
Signup and view all the answers
What action will result from the misuse of the NCIC/FCIC system?
What action will result from the misuse of the NCIC/FCIC system?
Signup and view all the answers
Where should employees ensure that the computer is being used when accessing NCIC/FCIC data?
Where should employees ensure that the computer is being used when accessing NCIC/FCIC data?
Signup and view all the answers
What are employees prohibited from doing on VOIP telephones?
What are employees prohibited from doing on VOIP telephones?
Signup and view all the answers
When should all network and NCIC/FCIC user accounts be deactivated?
When should all network and NCIC/FCIC user accounts be deactivated?
Signup and view all the answers
What shall employees supply when attempting to log into a Department-issued laptop?
What shall employees supply when attempting to log into a Department-issued laptop?
Signup and view all the answers
Which wireless protocols may employees utilize with their Department-issued laptops?
Which wireless protocols may employees utilize with their Department-issued laptops?
Signup and view all the answers
Who may utilize a remote connection to monitor or control a computer with access to NCIC/FCIC?
Who may utilize a remote connection to monitor or control a computer with access to NCIC/FCIC?
Signup and view all the answers
Who shall complete a Network Authorization Form for all new hires?
Who shall complete a Network Authorization Form for all new hires?
Signup and view all the answers
What should be done if an employee is terminated, resigns, transfers, or is reassigned?
What should be done if an employee is terminated, resigns, transfers, or is reassigned?
Signup and view all the answers
What should employees do if they suspect suspicious activity related to a VOIP telephone?
What should employees do if they suspect suspicious activity related to a VOIP telephone?
Signup and view all the answers