TCIC/LETS Full Access with CCH/CCQ Re-certification Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How many images can be associated with a NCIC property file record?

1

How many images can be associated with a NCIC person file record?

12

Passwords must be changed every ____ days?

90 days

Texas Identification Cards are:

A & C what is A & C?

A 'HIT' in NCIC is described as a what?

A positive response in which the person or property upon matches the information contained in the response

"REC STATUS: ELIGIBLE" in a Texas driver license return indicates that the subject:

All of the Above

FBI CJIS data/CHRI must be safeguarded to prevent:

All of the Above

It has been determined an agency has obtained III data and misused it. Who could be held responsible?

All of the Above

Nlets System Agency (NSA) is

All of the Above

What is the relationship between an NCIC hit and the legal concept of probable cause?

All of the Above

What type of warrant can be entered into NCIC 'Wanted Person File'?

All of the Above

Which of the following statements in/are correct concerning NCIC data?

All of the Above

What NCIC file if any should livestock be entered into?

Article File

TCIC/NCIC information obtained over TLETS/Nlets may be used by:

Authorized Criminal Justice Agencies only

The individual receiving a request for criminal justice information must ensure that the person requesting the information is:

Authorized to receive the data

When you receive a $.E Serious Error message from the FBI/NCIC, it menas the record has been:

Canceled

Information available throughout Nlets is controlled by _______________.

Contributing state and federal agencies

Texas Law Enforcement Telecommunication System and the International Justice and Public Safety Network are designed exclusively for use by

Criminal Justice Agencies in conducting their lawfully authorized duties.

The CJIS Systems Agency (CSA) in Texas is the:

Department of Public Safety

The purpose of the Continuity of Care information is to:

Ensure continuity of care for individuals involved in the criminal justice system who are ill and to provide local post-booking jail diversion opportunities.

If you have two warrants for a subject, one for criminal homicide and another for motor vehicle theft, how would you handle the entry?

Enter only the most serious warrant into the system and note the other warrant in the Miscellaneous (MIS) filed

The accuracy, timeliness, and completeness of records entered in TCIC/NCIC is the responsibility of:

Entering Agency

The agency responsible for the accuracy, timeliness, and completeness of NCIC records is:

Entering Agency's Staff

When a child has been reported missing and the child's life is feared to be in danger, what message key should for the entry of this child?

Entry - Endangered

Which Criminal History Purpose Code must be used by criminal justice agencies in all states for screening applications for firearms and related permits? This includes firearms dealers, firearms purchases, carriers of concealed weapons, explosives dealers and users, and lethal weapons dealers and users, but only when a Federal, State or Local Law/Ordinance exists making the criminal justice agency responsible for the issuance of the licenses/permits

F

A wanted person inquiry (QW/ZW) will not automatically cross-search the missing person file record

False

An officer has the right to run anyone they want to for no particular reason?

False

Continuity of Care guidelines for the communication between the Local Mental Health Authority and a county jail is managed by the local county court

False

The Continuity of Care response will always contain only one potential match

False

The social security number is mandatory information in the Continuity of Care inquire

False

Using the definition of administration of criminal justice, a county animal control unit is recognized as criminal justice agency

False

The computer site and/or terminal area must have adequate physical security to protect against any unauthorized personnel gaining access to the computer equipment or to any of the stored data. To protect against unauthorized access the terminal must be located:

In a secure location to which only authorized personnel have access.

There are two types of Administrative Message formats used in teletype operations:

Informal and Formal

The TLETS Continuity of Care transaction automates the manual exchange of mental health status information between:

Jails and the Local Mental Authorities (LMHA)

The jail should be in contact with the __________ so that a continuity of care decision can be clearly expressed and the jail can take appropriate action.

Local Mental Health Authorities

What is indicated by placing a "Y" in the NOA Field?

Notify ORI of All Hits

When an agency finds a a vehicle abandoned, an entry should be made into the TCIC Stored/Abandoned Vehicle file if the:

Owner cannot be located, there is no stolen record on file, and the vehicle is impounded

Transaction _____________ is used to obtain a Texas CCH and/or check for the existence of a criminal history in ________ - participating states

QH, III

What transaction code would you use to search the NICS Denied Transaction File?

QND

There are two types of Texas Driver License inquiries:

Status and History

An inquiry of the Article File must include?

TYP & SER/OAN

TCJS

Texas Commission on Jail Standards

The reason that the manual process has been changed is:

To expedite the process for identifying special needs offenders

A 'QPO' inquiry searches the 'Protection Order File' and retrieves active expired or cleared records:

True

A theft status on an INTERPOL travel document inquiry indicates the reason why the document is in the INTERPOL database

True

An audit trail must be established for any dissemination of III record information

True

Criminal Justice purpose (also know as the administration of criminal justice) include: detection, apprehension, detention, pretrial release, post-trial release, prosecution, adjudication, correctional supervision, or rehabilitation of accused persons.

True

If a positive response is received from INTERPOL on an initial inquiry, the operator should submit a full inquiry to get more detail using the EID number provided in the initial response.

True

If fingerprints were submitted, but rejected by the FBI, and the subject is never reprinted for that arrest, that arrest information would NOT appear in III

True

Improper use of CCH information by an individual at a law enforcement agency or department may result in administrative sanctions or criminal penalities

True

Messages that qualify for statewide dissemination, but do not retain to the safety of life or the apprehension of dangerous felons, should be sent in the APB daily summary

True

Once a vehicle record is entered into the NCIC Vehicle File, it remains in NCIC forever, or until the entering agency removes the record from NCIC.

True

Senate Bill 839 helped to automate communication between jail and local mental health authorities

True

The Client ID, Community Center Component (facility name), Community Center phone number and case ID are included in the response of a Continuity of Care Query (CCQ)

True

The NICS Denied Transaction Query (QND) will return any records of individuals who habe been denied, but is not restricted by the date of denial.

True

The National Denied Transaction File (NDTF) is cross-searched during an NCIC Wanted person inquiry (QW) and will return any records of individuals who have been denied during the last 180 days

True

The Nlets general or state help information may be accessed from the Nlets Query Help File transaction form

True

The Nlets query for Criminal History Supplemental Information 'AQ' should be used for requests for fingerprint cards, photos and for disposition information.

True

The license plate reader database provides information on whether a vehicle has crossed the Canadian or Mexican border

True

The record holding country man contact INTERPOL and request the reason for your inquiry

True

There are eight Nlets regions throughout the United State

True

There is standardized order when describing vehicles and persons in administrative messages. When information is not known, omit without comment

True

To inquire the lost gun file in NCIC, use transaction 'QG'

True

To obtain a specific criminal history via the III, a criminal history record record request (QR) transaction must be transmitted using both the FBI and SID number

True

Unauthorized requests, receipt, release, interception, dissemination or discussion of FBI CJIS data/CHRI could result in criminal prosecution and/or termination of employment

True

Users shall not share passwords or leave passwords in conspicuous location (under the key board, posted on the monitor, under the mouse pad, in/on the desk, etc.).

True

You can inquire into NCIC for images associated with person and property file records

True

The license plate reader system does not provide:

Vehicle Owner Name

Vehicle registration information obtained from TLETS and Nlets

is to be used for criminal justice and law enforcement purposes only

What transaction is used when checking n airplane to see if it is stolen?

(QV) Query Vehicle


Set pelajaran terkait

Business Finance Mid-term Exam 2

View Set

Imperialism (Africa, India, China, Japan)

View Set

Intermediate Accounting 1 Ch4 Part A

View Set

Business Exam - Marketing Quiz #3

View Set

EMT Chapter 17 - Neurologic Emergencies

View Set

Construction Management - JumpStart

View Set

Foundations Dosage Calc Assessment

View Set