Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

TIES TEST, TEST BANK. NEWEST ACTUAL EXAM 2025-2026. COMPLETE QUESTIONS & CORRECT ANSWERS, Exams of Criminal Justice

TIES TEST, TEST BANK. NEWEST ACTUAL EXAM 2025-2026. COMPLETE QUESTIONS AND CORRECT DETAILED GRADED A

Typology: Exams

2024/2025

Available from 07/14/2025

zaza-maica
zaza-maica ๐Ÿ‡ฌ๐Ÿ‡ง

2.2

(5)

3.6K documents

1 / 26

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
TIES TEST, TEST BANK. NEWEST
ACTUAL EXAM 2025-2026.
COMPLETE QUESTIONS AND
CORRECT DETAILED GRADED A
1 YEAR โ€“ ANS Criminal History logs must be maintained in a secure file for
a minimum of ____________ from the date of the transaction.
1) (RSN CODE), (T) Traffic, (S) Theft, (H) Humanitarian, (V) Violent
Crimes, (F) Fraud, (N) Narcotics 2) Person/Property (PPS), is the person or
property in sight? YES/NO โ€“ ANS There are special requirements when
inquiring on all Canadian files. They are:
180 DAYS - ANSNICS denied transaction file records are available in NCIC
for
2 HOURS - ANSPursuant to the Adam Walsh Child Protection and Safety
Act of 2006, a record for a missing person who is under the age of 21
should be entered into the NCIC using one of the appropriate categories
within __________ of receipt of the minimum data required to enter an
NCIC record.
3 _YEARS - ANSWhen a complete DOB is used in a QH, the search will
provide records that match name, sex, race and DOB plus or minus
__________.
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a

Partial preview of the text

Download TIES TEST, TEST BANK. NEWEST ACTUAL EXAM 2025-2026. COMPLETE QUESTIONS & CORRECT ANSWERS and more Exams Criminal Justice in PDF only on Docsity!

TIES TEST, TEST BANK. NEWEST

ACTUAL EXAM 2025-2026.

COMPLETE QUESTIONS AND

CORRECT DETAILED GRADED A

1 YEAR โ€“ ANS Criminal History logs must be maintained in a secure file for a minimum of ____________ from the date of the transaction.

  1. (RSN CODE), (T) Traffic, (S) Theft, (H) Humanitarian, (V) Violent Crimes, (F) Fraud, (N) Narcotics 2) Person/Property (PPS), is the person or property in sight? YES/NO โ€“ ANS There are special requirements when inquiring on all Canadian files. They are: 180 DAYS - ANSNICS denied transaction file records are available in NCIC for 2 HOURS - ANSPursuant to the Adam Walsh Child Protection and Safety Act of 2006, a record for a missing person who is under the age of 21 should be entered into the NCIC using one of the appropriate categories within __________ of receipt of the minimum data required to enter an NCIC record. 3 _YEARS - ANSWhen a complete DOB is used in a QH, the search will provide records that match name, sex, race and DOB plus or minus __________.

6 months of entry. - ANSAn agency is required to verify and update NCIC Missing Person record entries with any additional information, including: Blood Type (BLT); Dental Characteristics (DCH); Fingerprint Classification (FPC); Jewelry Type (JWT); and Scares, Marks, Tattoos, and Other Characteristics (SMT) within A FELONY CONVICTION - ANSprohibits an individual from being certified as a TIES operator A security incident is a...... - ANSviolation or attempted violation of the FBI CJI Security Policy or other security policy that would threaten the confidentiality, integrity, or availability of FBI or State CJI data. a state of residency and national fingerprint based check - ANSTo verify the identification, _______________________________________ shall be conducted for all personnel that have access to FBI CJIS Systems. Access to and use of FBI CJI - ANSis only for criminal justice or authorized civil purpose only. ADDTIONAL_OFFENSE - ANSWhen a warrant issued for a subject contains multiple charges, the _______________ field should be used to indicate that multiple charges exist for the same individual by the same ORI. ADMINISTRATION OF CRIMINAL JUSTICE - ANSPer the NCIC Operating Manual, the term ____________________ ___ _______________

AQ - ANSThe ______ is a free-form message sent to local agencies when only partial information is known. are required to have Security Awareness Training within 6 months of assignment. - ANSAll persons who have access to CJI AUTHORIZED PERSONNEL. - ANSAgencies must ensure the sanitation or destruction of media is always witnessed or carried out by biometric system - ANSAn example of advanced authentication is a Boat Registration number (REG), Boat Hull number (BHN) and the NAM/DOB of the registered owner. - ANSBoat registration information may be obtained by inquiring on the ___________________________________ BULK CASH SMUGGLING - ANSThe purpose of the ________________ transaction is to identify persons and/or vehicles involved in the illicit transportation or smuggling of bulk currency or monetary instruments. by the State, Federal or Local Agency. - ANSTraining records must be kept current Canadian files. - ANSThe reason code field (RSN) and person/property in sight field (PPS) are required when inquiring on all

CASE NUMBER and SECONDARY DISSEMINATION - ANSA criminal history log must contain complete information concerning the transaction, including the _______________________________ if known. Cellular devices - ANSmust encrypt all CJI data on the device, employ personal firewalls, employ antivirus software and use advanced authentication. CHRI - ANSis sensitive data and unauthorized use could result in criminal prosecution or termination of employment. CJIS SECURITY POLICY c - ANScontains the minimum level of Information Technology (IT) security requirements determined acceptable for the transmission, processing and storage of the nation's Criminal Justice Information System (CJIS) data. CJIS SYSTEM OFFICER. - ANSWhat does CSO abbreviation stand for? CLASS CODE - ANSInquiries on TN specialized license plates (e.g., university tags, National Guard, etc.) may provide multiple responses. The _______________ returned in each response identifies the type of license. CLEAR - ANSThe purpose of a ____________ message is to indicate location of a missing person, apprehension of a wanted person, if not detained, or recovery of property on file in NCIC.

identity history, biographic, property, and case/incident history data. Hot file data and criminal history data. curiosity Inquiry - ANSis considered an inquiry made for the purpose of snooping or prying into someone's Private business, completely unrelated to law enforcement or criminal justice employee's official duties in connection with the administration of criminal justices. They are not allowed on a TIES terminal. CURISOITY_INQUIRIES - ANSThe TIES computer cannot be used for _______________________ or personal messages. current by the State, Federal or Local Agency Officer. - ANSTraining records must be kept Custodial workers that access the terminal area must - ANShave a fingerprint background check done and security awareness training or they must be escorted when in these areas. DECEASED, LIVING, CATASTROPHE. - ANSDECEASED, LIVING, CATASTROPHE. DOB, FBI number, miscellaneous number, SSN and Operator License Number (OLN) - ANSFive identifiers that may be used in addition to the name in a wanted person inquiry are

EL PASO INTELLIGENCE CENTER. - ANSSupporting interdiction efforts and investigation regarding drug trafficking, alien and weapon smuggling, and counterterrorism are all part of the mission of the ENCRYPTION - ANSWhen CJI is transmitted outside the boundary of the physically secure location, the data shall be immediately protected via ENTRY-MODIFY-QUERY-CLEAR-CANCEL-LOCATE. - ANSThere are six types of messages pertaining to NCIC that can originate from a user and can be transmitted to the NCIC System. They are: every 90 days - ANSPasswords shall be changed within a maximum of _____ _____ _____ and shall not be transmitted in the clear outside the secure domain. false. - ANSAuthentication for access to FBI CJI data must occur at the FBI is FBI CJI data - ANSmust be safeguarded to prevent unauthorized access, improper release and casual viewing. FIREWALL - ANSIn order to have Internet access on a TIES computer, the Internet connection must run through a separate FOR LAW ENFORCEMENT DISSEMINATION ONLY. - ANSAn Administrative Message (AML) differs from the regular AM in that Nlets will insert the caveat

IMMIGRATION VIOLATORS File - ANScontains records on criminal aliens who have been deported for drug trafficking, firearms trafficking, or serious violent crimes and on foreign-born individuals who have violated some section of the Immigration and Nationality Act. Immigration Violators File - ANSDeported Felon, Absconder, and National Security Entry-Exit Registration System (NSEERS) are three categories of the offenders in the INDEFINITELY - ANSMissing person records are retained in NCIC


inquiring by FBI number. - ANSThe message key QR is used to request the specific criminal history record indexed in the III, INTERPOL - ANSAccess to __________________ records via Nlets provides information on international wanted person, stolen vehicles, and stolen travel documents. Interstate Identification Index (III) - ANSknown as Triple I, is a pointer system for the interstate exchange of criminal history record information is generally used when the person is being held on local charges or the property is abandoned or has been located and an immediate response is not necessary. - ANSThe routine priority for a Hit Confirmation Request

is not optional and has no ending date. - ANSPassword requirements defined in the FBI CJIS Security Policy for access to FBI CJI data is not PROBABLE CAUSE TO ARREST. - ANSA NCIC hit along is restricted to Law Enforcement and Criminal Justice Agencies. - ANSComputerized criminal history information IT security - ANSparamount to maintain the confidentiality, integrity and availability of criminal justice data. J - ANSPurpose code ___ is used to initiate background checks of vendors, contractors and volunteers who ARE involved with the actual administration of criminal justice. known or Appropriately Suspected Terrorist (KST) file and Convicted Sexual offender Registry File. - ANSHot files that contain CHRI include LICENSE STATE (LIS) - ANSIncluding the ___________________ field in a stolen license plate query will limit the scope of the search and avoid multiple responses. LOCATE MESSAGE - ANSmust be transmitted when an agency other than the originating agency of the record finds the missing person, apprehends the wanted person, or recovers the property on file in NCIC.

MISUSE - ANSis defined as accessing CJIS without authorization; accessing it by exceeding authorization; accessing it for an improper purpose; using, disseminating or re-disseminating CJIS received for a purpose other than your official criminal justice job duties. MUGSHOTS - ANSThe types of images that can be stored for an NCIC Person entry are ___________, signatures, and identifying images. MUST NOT advise the individual that they may be on a terrorist watch list. - ANSWhen a positive KST File response is received, the inquiring agency NATIONAL_INSURANCE_CRIME_BUREAU (NICB) - ANSassist law enforcement in the prevention, detection and prosecution of the financial crimes of theft, fraud, and arson relating to personal property. NATIONAL_SEX_OFFENDER_REGISTRY (NSOR) - ANSFile includes records for individuals who have been convicted of a sex-related crime against a minor, convicted of sexually violent offenses, or a person who is a sexually violent predator. NCIC OFF-LINE search - ANSis designed to provide law enforcement with investigative leads and can be used to determine if any other agency has made an inquiry on a particular individual or item of property. NCIC_ - ANSis a nationwide, computerized information system established as a service to criminal justice agencies - local, state, and federal.

NDPIX - ANSThe Drug Enforcement Administration (DEA) established ___________ as a nationwide, multijurisdictional, automated, information sharing system. NICS DENIED TRANSACTION FILE - ANSin NCIC is designed to share information regarding Individuals who have been denied as a result of a National Instant Criminal Background Check System (NICS) background check. NLETS _HIT CONFIRMATION REQUEST (YQ) - ANSAn _________________________________ would be used after receiving a hit from a NCIC Wanted Person inquiry. NLETS - ANSA check of the ________ help file will provide a summary of each state's automated status, along with specific inquiry capabilities for a giveN state. NLETS - ANSis also known as The International Justice and Public Safety Network no stolen or lost report on file - ANSA recovered (abandoned, seized, or found) weapon, for which ______________________ may be entered as a recovered gun. non-secure locations. - ANSAdvanced authentication is required for devices that access FBI CJI data from

PASSWORD - ANSIn addition to the identify theft victim's profile information, a __________________ is established and entered into the Identify Theft File. The victim should select a password that he/she can readily recall during any subsequent encounter with law enforcement personnel. PCO - ANSThe terms and conditions of the protection order are indicated in the _________ field people who read criminal histories but do not have a NCIC workstation of their own. - ANSTraining for appropriate personnel would include Personal Identifiable Information (PII) - ANSshall be extracted for CJI for the purpose of official business only PERSONALLY OWNED - ANSinformation system shall not be authorized to access, process, store or transmit CJI unless the agency has established and documented the specific terms and conditions for personally owned information system usage Physical, Natural, Hardware and Software. - ANSMost systems and networks are vulnerable to threats. Vulnerabilities include PHYSICALLY SECURE LOCATION - ANSis a facility or an area, a room, or a group of rooms within a facility with both the physical and personnel security control sufficient to protect CJI and associated information systems.

PROTECTION ORDER FILE - ANScontains court orders that are issued to prevent acts of domestic violence against a person or to prevent a person from stalking, intimidating, or harassing another person. purpose code C should be used - ANSWhen running background checks on volunteers at a criminal justice agency who are NOT involved with the actual administration of criminal justice at the agency, PURPOSE CODE; REASON - ANSAll III, QH and QR transactions must include the _____________ for which the criminal history record information is to be used. All users are required to provide the ________________ for all III transactions. Q, T or Z will be retained in the NCIC Article File indefinitely - ANSAn article record containing a TYP Field code beginning with ____________________________ (until it is cleared or canceled by the originating agency). QH - ANSis used to determine if a person is indexed in the III File, and is normally the first step in making a criminal history inquiry. Quality Assurance - ANSThe TCIC ______________________ Program was implemented to ensure the quality of NCIC entries by Tennessee users.

SECONDARY DISSEMINATION - ANSis the re-dissemination of CJI from an authorized agency that has direct access to the date to another authorized agency. Remember to document Secondary Dissemination the same as "chain of custody", not only the agency you are giving it to but also whose hands you are putting it in. Security Addendum - ANSWhich agreement must be signed between a Criminal Justice Agency and a Private contractor who accesses CJI is the SECURITY AWARENESS TRAINING - ANSThe CJIS Security Policy requires that the CJIS Systems Officer (CSO) ensure that__________________________ is provided at least once every two years to all personnel who have access to Criminal Justice Information (CJIS). SECURITY INCIDENT - ANSEach agency must establish a _________ __________ response and reporting procedure to discover, investigate, document, and promptly report to the CSA any security incidents that significantly endanger the security or integrity of the CJI send an AM to the FEDERAL_AIR_MARSHALL SERVICE - ANSFor state or local law enforcement officers (LEO) to fly armed the employing agency must ______________________________________________ with the required detailed flying armed specifications.

SER and_MAK - ANSInquiry into the NCIC Gun File by ____________ is preferred as this type of inquiry may limit the search and minimize the number of false positive responses. should be limited as to allow completion of assigned authorized official duties only. - ANSAccess to rooms containing systems/components that access FBI CJIS data/CHRI shredding or burning - ANSPrinted material from the TIES computer that is no longer required must be disposed of in a manner that prevents unauthorized use such as SIGNED POLICE REPORT - ANSIn the absence of documentation from a parent, legal guardian, next of kin, or physician, a ___________________________ will suffice for entry of record into the Missing Person File. STATE or _COUNTRY - ANSAll ORIs begin with a two-character _________________ code in which the agency is located state repositories; FINGERPRINT SUBMISSION. - ANSComputerized criminal history arrest contained in all __________________ (TBI in Tennessee) and the FBI Interstate Identification Index (III) are based on _______________________. SUBMIT AN OFFICIAL REQUEST TO THE TENNESSEE DEPARTMENT OF SAFETY - ANSHow would you determine that a non-law enforcement