451 - ISM Flashcards

1
Q

Who is the owner of ISM?

A

Assistant Chief of ISM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ______, ______, ______ is the foundation for the JSO local security policy.

A

Federal Bureau of Investigations (FBI)

Criminal Justice Information Services (CJIS)

Security Policy (CSP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computers shall not be accessible to the _____.

A

public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluetooth network connectivity or data sharing and transfer are ____ ________.

A

not permitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If a virus is detected, the individual will immediately do the following: (5)

A
  1. Stop all work on the affected machine
  2. Turn off the computer
  3. Do not allow others to use the computer
  4. Call ISM Help Desk
  5. ISM will perform the removal of the virus, if possible, or reloading of software if necessary.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access to Driver and Vehicle Information Database (DAVID) is for?

A

criminal justice purposes only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confirmed _____ (of DAVID) will be reported to Florida Department of Highway Safety and Motor Vehicles (DSHMV) per the Memorandum of Understanding between JSO and DSHMV.

A

misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DAVID
Emergency Contact Information (ECI) shall only be used for the purpose of notifying an individual’s registered emergency contact in the event of a serious injury, death, or other incapacitation. ECI shall not be used to develop leads or for?

A

criminal investigative purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If a criminal history is retrieved from FCIC/NCIC and is subject to secondary dissemination, then the following information must be recorded in a secondary
dissemination log: (8)

A
  1. The date the criminal history was released
  2. The subject (name) of the criminal history request
  3. The FBI or State Identification number (SID).
  4. The name of the person who the information was released to
  5. The requestor’s agency name
  6. The name of the person who released the information to the requestor
  7. The reason the criminal history was requested
  8. The purpose code used to run the criminal history.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The secondary dissemination log must be retained for ____ years.

A

four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If positive control of a mobile device is lost for any period of time, notify __________.

A

ISM Help Desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

All Inter-agency access shall be authorized by the ______ or designee.

A

Sheriff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

JSO users should be aware that they have no ___________________ while using any
information technology resources.

A

expectation of privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Specific personnel who routinely require access to secured information systems such as, local, state, and national criminal justice systems, to perform essential
administration functions critical to the continued operation of the agency qualify for additional access. Such access is often termed ______ or _______.

A

administrative or privileged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Administrative or privileged accounts shall be authorized by _______ level approvals.

A

director

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Passwords on the JSO network are electronically prompted to change every __ days.

A

90

17
Q

When an employee leaves JSO the account will be immediately disabled, unless authorized by the ________ or ________.

A

Undersheriff or Sheriff

18
Q

Each employee is responsible for checking his e-mail account at least _____________.

A

once during each workday

19
Q

Viewing or opening e-mail addressed to an employee creates a _______ by JSO that the employee has read the email and all its attachments.

A

presumption

20
Q

Internet Usage

For extremely limited personal use provided that such use does not: (4)

A
  1. Directly or indirectly interfere with computer or networking services
  2. Burden the JSO with additional cost
  3. Interfere with an individual employees’ assigned duties, employment or other obligations to the JSO
  4. Reflect negatively on the JSO, the COJ, or its employees
21
Q

No computer-related hardware purchases will be processed through the JSO Budget Division
or Supply Units without the approval of ___.

A

ISM

22
Q

JSO computer equipment will not be moved, removed from, or transferred between locations, unless specifically authorized by ___.

A

ISM

23
Q

If a spill should occur, turn the computer ___. If the spill occurs on a desktop, unplug the keyboard and bring it to___. If the spill occurs to a laptop, bring it to ___ as soon as possible.

A

off
ISM
ISM

24
Q

DO NOT USE _______ BASED PRODUCTS TO CLEAN A LAPTOP.

A

AMMONIA

25
Q

ISM is the only unit allowed to perform any type of __________ or ________ with the exception of standard cleaning.

A

maintenance or repair

26
Q

No personally owned devices are allowed to connect to the JSO network unless ________.

A

authorized

27
Q

The JSO will not tolerate any employee making or using _________ copies of software.

A

unauthorized

28
Q

Requests to purchase new software must be routed through ISM, initiated via a work order, and approved by _____ or above from each unit and ISM.

A

chief

29
Q

No software purchases will be processed through the JSO Budget Division or Supply Unit without the approval of ___.

A

ISM.

30
Q

When ISM is contacted for database and application design and/or development, the requestor will be redirected to the _________________for prioritization of the proposed project.

A

Professional Oversight Unit