Podcast
Questions and Answers
According to the policy, what standards does the Department use to govern the operation of criminal justice information systems?
According to the policy, what standards does the Department use to govern the operation of criminal justice information systems?
- National Criminal Investigation Standards
- State Criminal Justice Compliance Regulations
- Departmental Information Security Directive
- Criminal Justice Information Services (CJIS) Security Policy (correct)
What is the role of the Local Agency Security Officer (LASO) according to the directive?
What is the role of the Local Agency Security Officer (LASO) according to the directive?
- To be the point-of-contact for matters relating to CJIS information access
- To administer CJIS systems programs within the local agency
- To serve as the security point of contact with the CJIS Systems Agency (CSA) (correct)
- To oversee the agency’s compliance with CJIS systems policies
What does FCIC Agency Coordinator (FAC) do within the Department?
What does FCIC Agency Coordinator (FAC) do within the Department?
- Oversees the agency’s compliance with CJIS systems policies
- Acts as the National Criminal Information Center coordinator
- Administers CJIS systems programs within the local agency (correct)
- Serves as the security point of contact with the CJIS Systems Agency (CSA)
Which systems are mentioned in the departmental standards directive as examples of criminal justice information systems that employees may use?
Which systems are mentioned in the departmental standards directive as examples of criminal justice information systems that employees may use?
Who is the designated CSA for Florida according to the departmental standards directive?
Who is the designated CSA for Florida according to the departmental standards directive?
What is the requirement for establishing a remote access connection by employees?
What is the requirement for establishing a remote access connection by employees?
How is vendor remote access granted?
How is vendor remote access granted?
What is the procedure for granting vendor access through remote access software?
What is the procedure for granting vendor access through remote access software?
What is the requirement for storing servers containing criminal history information (CHI) data?
What is the requirement for storing servers containing criminal history information (CHI) data?
How should electronic media containing CHI be stored when not in the physical control of the user?
How should electronic media containing CHI be stored when not in the physical control of the user?
Who should be responsible for maintaining documentation of any security incident?
Who should be responsible for maintaining documentation of any security incident?
Who is responsible for administering updates and patches to Department computers?
Who is responsible for administering updates and patches to Department computers?
What should employees do in case of any threat to the security of NCIC/FCIC data or systems?
What should employees do in case of any threat to the security of NCIC/FCIC data or systems?
'Vendor support is necessary to provide updates to software and troubleshoot system problems' - True or False?
'Vendor support is necessary to provide updates to software and troubleshoot system problems' - True or False?
'Using personal devices for remote access connections is allowed' - True or False?
'Using personal devices for remote access connections is allowed' - True or False?
When should Department employees or approved IT personnel accompany all visitors to computer centers and/or workstations?
When should Department employees or approved IT personnel accompany all visitors to computer centers and/or workstations?
Who should complete the IT Security Incident Response Form to document security incidents?
Who should complete the IT Security Incident Response Form to document security incidents?
Who is required to undergo background screening as prescribed in the CJIS Security Policy?
Who is required to undergo background screening as prescribed in the CJIS Security Policy?
What type of training must Department employees complete to be permitted to operate computers with NCIC/FCIC access?
What type of training must Department employees complete to be permitted to operate computers with NCIC/FCIC access?
What action will result from the misuse of the NCIC/FCIC system?
What action will result from the misuse of the NCIC/FCIC system?
Where should employees ensure that the computer is being used when accessing NCIC/FCIC data?
Where should employees ensure that the computer is being used when accessing NCIC/FCIC data?
What are employees prohibited from doing on VOIP telephones?
What are employees prohibited from doing on VOIP telephones?
When should all network and NCIC/FCIC user accounts be deactivated?
When should all network and NCIC/FCIC user accounts be deactivated?
What shall employees supply when attempting to log into a Department-issued laptop?
What shall employees supply when attempting to log into a Department-issued laptop?
Which wireless protocols may employees utilize with their Department-issued laptops?
Which wireless protocols may employees utilize with their Department-issued laptops?
Who may utilize a remote connection to monitor or control a computer with access to NCIC/FCIC?
Who may utilize a remote connection to monitor or control a computer with access to NCIC/FCIC?
Who shall complete a Network Authorization Form for all new hires?
Who shall complete a Network Authorization Form for all new hires?
What should be done if an employee is terminated, resigns, transfers, or is reassigned?
What should be done if an employee is terminated, resigns, transfers, or is reassigned?
What should employees do if they suspect suspicious activity related to a VOIP telephone?
What should employees do if they suspect suspicious activity related to a VOIP telephone?
Flashcards are hidden until you start studying