Criminal Justice Information Systems Security
29 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

According to the policy, what standards does the Department use to govern the operation of criminal justice information systems?

  • National Criminal Investigation Standards
  • State Criminal Justice Compliance Regulations
  • Departmental Information Security Directive
  • Criminal Justice Information Services (CJIS) Security Policy (correct)
  • What is the role of the Local Agency Security Officer (LASO) according to the directive?

  • To be the point-of-contact for matters relating to CJIS information access
  • To administer CJIS systems programs within the local agency
  • To serve as the security point of contact with the CJIS Systems Agency (CSA) (correct)
  • To oversee the agency’s compliance with CJIS systems policies
  • What does FCIC Agency Coordinator (FAC) do within the Department?

  • Oversees the agency’s compliance with CJIS systems policies
  • Acts as the National Criminal Information Center coordinator
  • Administers CJIS systems programs within the local agency (correct)
  • Serves as the security point of contact with the CJIS Systems Agency (CSA)
  • Which systems are mentioned in the departmental standards directive as examples of criminal justice information systems that employees may use?

    <p>NCIC/FCIC, PALMS, DAVID</p> Signup and view all the answers

    Who is the designated CSA for Florida according to the departmental standards directive?

    <p>FDLE</p> Signup and view all the answers

    What is the requirement for establishing a remote access connection by employees?

    <p>Only using Department-issued devices approved by the IT Department</p> Signup and view all the answers

    How is vendor remote access granted?

    <p>Through specialized software built for secure third-party remote access</p> Signup and view all the answers

    What is the procedure for granting vendor access through remote access software?

    <p>The vendor is escorted by authorized IT or Department employees until the work is complete</p> Signup and view all the answers

    What is the requirement for storing servers containing criminal history information (CHI) data?

    <p>Ensuring they are stored within secure locations accessible by key or access card</p> Signup and view all the answers

    How should electronic media containing CHI be stored when not in the physical control of the user?

    <p>Kept in locked cabinets or offices</p> Signup and view all the answers

    Who should be responsible for maintaining documentation of any security incident?

    <p>IT personnel</p> Signup and view all the answers

    Who is responsible for administering updates and patches to Department computers?

    <p>IT personnel</p> Signup and view all the answers

    What should employees do in case of any threat to the security of NCIC/FCIC data or systems?

    <p>Document and forward any threat or perceived threat to the Department’s FAC or LASO</p> Signup and view all the answers

    'Vendor support is necessary to provide updates to software and troubleshoot system problems' - True or False?

    <p>True</p> Signup and view all the answers

    'Using personal devices for remote access connections is allowed' - True or False?

    <p>False</p> Signup and view all the answers

    When should Department employees or approved IT personnel accompany all visitors to computer centers and/or workstations?

    <p>At all times</p> Signup and view all the answers

    Who should complete the IT Security Incident Response Form to document security incidents?

    <p>LASO personnel</p> Signup and view all the answers

    Who is required to undergo background screening as prescribed in the CJIS Security Policy?

    <p>Only Department employees with direct access to criminal justice information</p> Signup and view all the answers

    What type of training must Department employees complete to be permitted to operate computers with NCIC/FCIC access?

    <p>NCIC/FCIC certification</p> Signup and view all the answers

    What action will result from the misuse of the NCIC/FCIC system?

    <p>Disciplinary action up to termination and/or prosecution</p> Signup and view all the answers

    Where should employees ensure that the computer is being used when accessing NCIC/FCIC data?

    <p>Within a marked Department vehicle</p> Signup and view all the answers

    What are employees prohibited from doing on VOIP telephones?

    <p>All of the above</p> Signup and view all the answers

    When should all network and NCIC/FCIC user accounts be deactivated?

    <p>Immediately upon an employee's resignation, retirement, or termination</p> Signup and view all the answers

    What shall employees supply when attempting to log into a Department-issued laptop?

    <p>Both their Department credentials and an alternate form of identification</p> Signup and view all the answers

    Which wireless protocols may employees utilize with their Department-issued laptops?

    <p>Department’s internal Wi-Fi network, vehicle-based Wi-Fi connection, and cellular data connection</p> Signup and view all the answers

    Who may utilize a remote connection to monitor or control a computer with access to NCIC/FCIC?

    <p>Only NCIC/FCIC certified users</p> Signup and view all the answers

    Who shall complete a Network Authorization Form for all new hires?

    <p>Professional Standards Bureau employees</p> Signup and view all the answers

    What should be done if an employee is terminated, resigns, transfers, or is reassigned?

    <p>IT personnel should review all user accounts within 7 business days.</p> Signup and view all the answers

    What should employees do if they suspect suspicious activity related to a VOIP telephone?

    <p>Contact IT personnel for further instructions.</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser