TCIC/LETS Full Access with CCH/CCQ Re-certification Test
How many images can be associated with a NCIC property file record?
1
How many images can be associated with a NCIC person file record?
12
Passwords must be changed every ____ days?
90 days
Texas Identification Cards are:
A & C what is A & C?
A 'HIT' in NCIC is described as a what?
A positive response in which the person or property upon matches the information contained in the response
"REC STATUS: ELIGIBLE" in a Texas driver license return indicates that the subject:
All of the Above
FBI CJIS data/CHRI must be safeguarded to prevent:
All of the Above
It has been determined an agency has obtained III data and misused it. Who could be held responsible?
All of the Above
Nlets System Agency (NSA) is
All of the Above
What is the relationship between an NCIC hit and the legal concept of probable cause?
All of the Above
What type of warrant can be entered into NCIC 'Wanted Person File'?
All of the Above
Which of the following statements in/are correct concerning NCIC data?
All of the Above
What NCIC file if any should livestock be entered into?
Article File
TCIC/NCIC information obtained over TLETS/Nlets may be used by:
Authorized Criminal Justice Agencies only
The individual receiving a request for criminal justice information must ensure that the person requesting the information is:
Authorized to receive the data
When you receive a $.E Serious Error message from the FBI/NCIC, it menas the record has been:
Canceled
Information available throughout Nlets is controlled by _______________.
Contributing state and federal agencies
Texas Law Enforcement Telecommunication System and the International Justice and Public Safety Network are designed exclusively for use by
Criminal Justice Agencies in conducting their lawfully authorized duties.
The CJIS Systems Agency (CSA) in Texas is the:
Department of Public Safety
The purpose of the Continuity of Care information is to:
Ensure continuity of care for individuals involved in the criminal justice system who are ill and to provide local post-booking jail diversion opportunities.
If you have two warrants for a subject, one for criminal homicide and another for motor vehicle theft, how would you handle the entry?
Enter only the most serious warrant into the system and note the other warrant in the Miscellaneous (MIS) filed
The accuracy, timeliness, and completeness of records entered in TCIC/NCIC is the responsibility of:
Entering Agency
The agency responsible for the accuracy, timeliness, and completeness of NCIC records is:
Entering Agency's Staff
When a child has been reported missing and the child's life is feared to be in danger, what message key should for the entry of this child?
Entry - Endangered
Which Criminal History Purpose Code must be used by criminal justice agencies in all states for screening applications for firearms and related permits? This includes firearms dealers, firearms purchases, carriers of concealed weapons, explosives dealers and users, and lethal weapons dealers and users, but only when a Federal, State or Local Law/Ordinance exists making the criminal justice agency responsible for the issuance of the licenses/permits
F
A wanted person inquiry (QW/ZW) will not automatically cross-search the missing person file record
False
An officer has the right to run anyone they want to for no particular reason?
False
Continuity of Care guidelines for the communication between the Local Mental Health Authority and a county jail is managed by the local county court
False
The Continuity of Care response will always contain only one potential match
False
The social security number is mandatory information in the Continuity of Care inquire
False
Using the definition of administration of criminal justice, a county animal control unit is recognized as criminal justice agency
False
The computer site and/or terminal area must have adequate physical security to protect against any unauthorized personnel gaining access to the computer equipment or to any of the stored data. To protect against unauthorized access the terminal must be located:
In a secure location to which only authorized personnel have access.
There are two types of Administrative Message formats used in teletype operations:
Informal and Formal
The TLETS Continuity of Care transaction automates the manual exchange of mental health status information between:
Jails and the Local Mental Authorities (LMHA)
The jail should be in contact with the __________ so that a continuity of care decision can be clearly expressed and the jail can take appropriate action.
Local Mental Health Authorities
What is indicated by placing a "Y" in the NOA Field?
Notify ORI of All Hits
When an agency finds a a vehicle abandoned, an entry should be made into the TCIC Stored/Abandoned Vehicle file if the:
Owner cannot be located, there is no stolen record on file, and the vehicle is impounded
Transaction _____________ is used to obtain a Texas CCH and/or check for the existence of a criminal history in ________ - participating states
QH, III
What transaction code would you use to search the NICS Denied Transaction File?
QND
There are two types of Texas Driver License inquiries:
Status and History
An inquiry of the Article File must include?
TYP & SER/OAN
TCJS
Texas Commission on Jail Standards
The reason that the manual process has been changed is:
To expedite the process for identifying special needs offenders
A 'QPO' inquiry searches the 'Protection Order File' and retrieves active expired or cleared records:
True
A theft status on an INTERPOL travel document inquiry indicates the reason why the document is in the INTERPOL database
True
An audit trail must be established for any dissemination of III record information
True
Criminal Justice purpose (also know as the administration of criminal justice) include: detection, apprehension, detention, pretrial release, post-trial release, prosecution, adjudication, correctional supervision, or rehabilitation of accused persons.
True
If a positive response is received from INTERPOL on an initial inquiry, the operator should submit a full inquiry to get more detail using the EID number provided in the initial response.
True
If fingerprints were submitted, but rejected by the FBI, and the subject is never reprinted for that arrest, that arrest information would NOT appear in III
True
Improper use of CCH information by an individual at a law enforcement agency or department may result in administrative sanctions or criminal penalities
True
Messages that qualify for statewide dissemination, but do not retain to the safety of life or the apprehension of dangerous felons, should be sent in the APB daily summary
True
Once a vehicle record is entered into the NCIC Vehicle File, it remains in NCIC forever, or until the entering agency removes the record from NCIC.
True
Senate Bill 839 helped to automate communication between jail and local mental health authorities
True
The Client ID, Community Center Component (facility name), Community Center phone number and case ID are included in the response of a Continuity of Care Query (CCQ)
True
The NICS Denied Transaction Query (QND) will return any records of individuals who habe been denied, but is not restricted by the date of denial.
True
The National Denied Transaction File (NDTF) is cross-searched during an NCIC Wanted person inquiry (QW) and will return any records of individuals who have been denied during the last 180 days
True
The Nlets general or state help information may be accessed from the Nlets Query Help File transaction form
True
The Nlets query for Criminal History Supplemental Information 'AQ' should be used for requests for fingerprint cards, photos and for disposition information.
True
The license plate reader database provides information on whether a vehicle has crossed the Canadian or Mexican border
True
The record holding country man contact INTERPOL and request the reason for your inquiry
True
There are eight Nlets regions throughout the United State
True
There is standardized order when describing vehicles and persons in administrative messages. When information is not known, omit without comment
True
To inquire the lost gun file in NCIC, use transaction 'QG'
True
To obtain a specific criminal history via the III, a criminal history record record request (QR) transaction must be transmitted using both the FBI and SID number
True
Unauthorized requests, receipt, release, interception, dissemination or discussion of FBI CJIS data/CHRI could result in criminal prosecution and/or termination of employment
True
Users shall not share passwords or leave passwords in conspicuous location (under the key board, posted on the monitor, under the mouse pad, in/on the desk, etc.).
True
You can inquire into NCIC for images associated with person and property file records
True
The license plate reader system does not provide:
Vehicle Owner Name
Vehicle registration information obtained from TLETS and Nlets
is to be used for criminal justice and law enforcement purposes only
What transaction is used when checking n airplane to see if it is stolen?
(QV) Query Vehicle