click below
click below
Normal Size Small Size show me how
IDACS STUDY GUIDE
STUDY GUIDE
| Question | Answer |
|---|---|
| To respond to all AQ's the __msg key should be used | AR |
| When an approved non-criminal justice agency is approved to have access to system date on a limited bases ______________. | only that data approved by the IDACS committee and approved by ISP |
| A response may take up to 20 mins when making an inquiry into ins however LESC will provide _______________. | an automated acknowledgement notifying that his/ her inquiry has been received and is being processed |
| When a felony vehicle record is entered, what information should be entered into the MIS field? | a brief description of the felony in which the vehicle is believed to be involved |
| A stolen VIN plate would be entered into which file | vehicle parts file |
| Which one of the following is a valid purpose code to inquire into NCIC III? | weapons related (CODE F) |
| Entries made into the Indiana Bulletin Board File must be _____. | professional, businesslike, and qualify for one of the topics |
| When only 1 numeric ID is used in a QW, the response will include____. | only the record file containing that specific numeric ID |
| The maximum number of images that a person record/ protection order can contain is________________. | 1 MUG, 10 ID images, and 1 SIGNATURE |
| When a positive hit response is received from the Protective Interest File (Formerly the US Secret Service USSS file)_____. | no arrest or detention should be made based on the information contained in the file |
| An inquiry into the article field file must include ___. | the type of article and a manufacturers serial number or OLN |
| An inquiry can be made into the NLETS Hazmat file buy entering ____. | UN number |
| Which of the following CHRI info request formats can be sent to specific state? | AQ |
| What does the vehicle data in a wanted person record indicate? | the entering agency has reasonable grounds to believe that he wanted person may be in possession of the vehicle |
| There are two types of records in the Foreign Fugitive File? | Canadian and Interpol Warrants |
| What race is used when an inquiry into the wanted person file when race is unknown? | U |
| Validating a record obliges the entering ORI to confirm the record is_______. | Complete, Accurate, and Outstanding |
| Stolen aircraft should be entered as? | Stolen vehicle |
| Which of the following cannot be entered into the Article File? | Credit cards |
| Inquiries and records requests transmitted to III must include? | The purposes for which the info is to be used |
| An inquiry into the Wanted/ Missing QW files__________. | spawns inquiries into several other files, sex offender gang file and protection |
| If a locating agency intends to hold an individual on local changes, the locate transaction should indicate? | DETN in the ext field |
| The hit confirmation policy states that an agency receiving an URGENT request or hit confirmation send a substantive response within _________. | 10 minutes |
| The purpose of an IQ is? | to request identity info from a state central repository |
| A secure location of a terminal is defined as?? | secure from public access and view of the screen and/or printed data |
| When entering a stolen gun into IDACS and more than 1 number appears on the firearm________________. | The serial number on the firearm or receiver should be placed in the serial number field and other number should be placed in the MIS field |
| to limit a search or reduce the amount of false positive responses on a gun inquiry enter_________. | serial number, make, caliber |
| a file that does not have image capability is? | security |
| Which of the following is not allowed access to the system data? | private security companies and PI's |
| For CHRI/III info, Federal Title 28 states________________. | No agency or individual shall confirm the existence r nonexistence of criminal hx record information to any person or agency that would not be eligible to receive the information itself |
| What agency is responsible for placing a locate on an IDACS/NCIC wanted entry? | The recovering agency if other than the agency that entered the record |
| The purpose of a modification transaction is _____. | to add, delete or change data |
| When there is an attempted breach of security, the terminal operator should___________. | notify data operations and/or IDACS section to the attention of the IDACS security officer using admin message |
| According to IC240 IAC 5-2-10 Security and Confidentiality, what site must be in place around terminals accessing the system? | must be in a site previously approved by IDACS committee |
| When inquiring on an IN-license plate, the LIY field should contain____. | the year of expiration |
| A positive hit response from IDACS/NCIC is considered which of the following? | must be considered at lead information only and verification with the originating agency is required |
| If there is a restriction concerning extradition on a Wanted Person entry, the information should be_________. | entered in the MIS field of record |
| The gang file and known or appropriately suspected terrorist file KST have been designed to___. | provide identifying info about violent gang and terrorist organizations and members of those gangs and organizations to alw enforcement personnel only |
| The purpose of NLETS is to | provide interstate messages switching for all law enforcement and criminal justice agencies |
| A vehicle use3d in he commission f a felony may be entered into which of the following files providing the whereabouts of the vehicle is unknown | vehicle file |
| a credit card can be entered into which file | credit cards cannot be entered into any file |
| related search hits (RSH) will return all | entries with the same ORI and OCA |
| users password must be changed ever ___ | 90 days |
| The expanded name search (ENS) field defaults to N for No, if changed to Y, the ENS shall include what? | combination of the surname, first name, and middle name |
| The purpose of an FQ inquiry is to ___ | retrieve full record from a state repository when a positive response is received |
| When an agency fails to respond to a second request hit confirmation, the agency will generate ____ | 3rd request which will be sent to the agency ORI, data operations, and NCIC |
| What is the max number of identifiers that an be used in the distribution field for an AM? | 5 |
| Paintball and BB guns are entered into which file? | Article File |
| Confirming a hit means_____? | the entering agency must be contacted to insure the person or property is identical and the case is still active |
| When inquiring into BMV drivers license files the preferred inquiry is by? | NAME, DOB, and SEX |
| If more than one number appears on a weapon ____. | the frame number should be inquired on first |
| When entering a stolen article (EA), and no brand name exists for the property, enter _____ in the BRA field. | " NO BRA" |
| When sending a YQ to Canada what should be entered into the NIC field? | "NONE" |
| Requests submitted to INTERPOL can be obtained by____. | an AM MSG, agency letterhead by mail, or NLETS |
| Audit trail requests, manually or by automation, stipulate that AM sent and received shall be kept for a min of ___. | 6 months |
| A temp felony want indicates that entering agency has ____________. | reasonable ground to believe that the subject committed the crimes for which a warrant will be obtained as soon as possible |
| If subject is held on local charge or property is detained with no extenuating circumstances, which of the following hit confirmation priorities would be used? | R for ROUTINE |
| During the IDACS inspection, the security officer will _______. | verify that all new operators have been fingerprinted and issued a userID |
| All entries into IDACS/NCIC wanted persons files shall be supported by____. | written documentation in the form of a case report |
| If on state in a multi state III response has reported the subject deceased_____. | the response will indicate "deceased" with SID number of the state that reported the information |
| Located securities record will be returned from the system after_____. | 10 days |
| Stolen license plate stickers should be entered into___. | Article file |
| Which is required to be entered into the IDACS by Indiana Law? | Missing Persons |
| An inquiry on a stolen boat (QB) may be made using the following identifiers? | ALL OF THE ABOVE |
| Who may enter subjs into supervised release file? | ALL OF THE ABOVE |
| A locate transaction should be made against the record of another agency only after the following conditions have been met | ALL OF THE ABOVE |
| When all the information from a Canadian vehicle field hit has been confirmed, the locating agency should___. | A AND B |
| When clearing a record from a file, a message is transmitted when ___. | A AND B |
| Which of the following is NOT a precaution to prevent shoulder surfing? | Keep passwords and other important information on sticky notes tacked to your monitor |
| When only one numeric identifier is used in a wanted person query (QW), the response will include ___. | only the record on file containing that specific numeric identifier |
| Requests submitted to INTERPOL (international criminal police organization) can be obtained by? | NLETS INQUIRY |
| How many agencies can place an investigative interest on an IDACS/NCIC record? | 10 |
| T or F? Records in a located status can be modified? | False |
| T or F? an AQ (additional inquiry) cannot be sent to a specific agency utilizing their 9 character ORI | False |
| A record must be cleared from file, when ___. | A AND B |
| T or F? Protection orders are entered into the Protection Order Registry (POR) by the clerk of issuing Court and if the criteria for entry is met an automatic entry into IDACS/NCIC is made under IN049045J | True |
| Which two (2) person files allow the entry of email addresses? | supervised released AND sex offender |
| An example of digital media which should be protected and restricted to authorized individuals is ____. | ALL OF THESE ARE CORRECT |
| T or F? You can find the agency phone number in an ORION file response. | True |
| What message key (MKE) should be used if the entering agency of a stolen vehicle believes the occupants are armed and dangerous and also wants the vehicle held for latent fingerprints? | EV-F |
| In an admin message, the sending agency field should contain? | THE NAME OF THE SENDING AGENCY |
| Which one of the following crim hx record information request formats can be sent to a local agency, specific out-of-state agency, or a state central repository? | AQ (additional information request inquiry) |
| If electronic media cannot be physically destroyed, it must be ___ to prevent unauthorized access to previously stored data. | Overwritten at least 3 times |