1.
What information must be included in an inquiry of the article file?
Correct Answer
D. All of the above
Explanation
An inquiry of the article file must include all of the above information, which includes the type of article, serial number, and owner applied number. This information is crucial for identifying and retrieving the specific article being inquired about. The type of article helps categorize and locate it within the file, while the serial number and owner applied number serve as unique identifiers that ensure accuracy and prevent confusion. Including all of this information in the inquiry helps streamline the process and ensures that the correct article is being addressed.
2.
Which one of these would NOT be addressed by the agency written policy concerning the MDT?
Correct Answer
D. Shift Scheduling
Explanation
The agency written policy concerning the MDT would address security of the MDT, acceptable use of information, and passwords. However, shift scheduling would not be addressed by this policy as it is unrelated to the use and security of the MDT. Therefore, the correct answer is shift scheduling.
3.
How long is the message log maintained?
Correct Answer
B. 1 Year
Explanation
The message log is maintained for a period of 1 year. This means that all messages sent or received within the system will be stored and accessible for a duration of 1 year before being deleted. This timeframe allows for a reasonable amount of time to review and reference past messages, while also ensuring that the log does not become too cluttered with outdated information.
4.
Who is the person primarily responsible for the security of information from the MDT?
Correct Answer
C. You
Explanation
The person primarily responsible for the security of information from the MDT is "You." This implies that the individual being addressed in the question is the one who holds the main responsibility for ensuring the security of information from the MDT. It suggests that the individual must take proactive measures to safeguard the information and prevent any unauthorized access or breaches.
5.
How long is a temporary felon record in NCIC?
Correct Answer
C. 48 Hours
Explanation
A temporary felon record in NCIC is valid for 48 hours. This means that the information regarding a felony offense will be retained in the NCIC database for a period of 48 hours before it is removed. After this time, the record will no longer be accessible or available for reference.
6.
What agency is responsible for NCIC operations and maintenance?
Correct Answer
B. FBI
Explanation
The Federal Bureau of Investigation (FBI) is responsible for NCIC (National Crime Information Center) operations and maintenance. The NCIC is a computerized database that provides law enforcement agencies with information on wanted persons, stolen property, and other criminal records. As a federal law enforcement agency, the FBI oversees the management and functioning of the NCIC, ensuring its effectiveness and security in supporting criminal justice activities nationwide.
7.
What agency is responsible for LINK operations and maintenance?
Correct Answer
B. KSP
Explanation
The correct answer is KSP. KSP stands for Kentucky State Police. They are responsible for the operations and maintenance of LINK, which refers to the Law Enforcement Information Network. This network is used for sharing information among law enforcement agencies in Kentucky.
8.
A _________________ is defined as a postive response to an inquiry transaction.
Correct Answer
B. Hit
Explanation
A "hit" can be defined as a positive response to an inquiry transaction.
9.
The foreign fugitive file, Convicted person on supervised release, convicted sex offender, immigration violations file, absconder category, NSEERS (National Security Entry Exit registration System), and __________________ are additional files that are checked in NCIC when running a wanted person inquiry.
Correct Answer
B. Deported Felon
Explanation
When running a wanted person inquiry in NCIC, in addition to the foreign fugitive file, convicted person on supervised release, convicted sex offender, immigration violations file, absconder category, and NSEERS, the Deported Felon file is also checked. This means that the NCIC system will search for any records or information related to individuals who have been deported due to committing felonies. These individuals may pose a potential risk or threat, and therefore their records are included in the wanted person inquiry.
10.
Frequent INLETS transactions include interstate messages, out of state inquires, and __________________________.
Correct Answer
C. Hazardous materials inquiries
Explanation
Frequent INLETS transactions include interstate messages, out of state inquires, and hazardous materials inquiries. This suggests that one of the common types of transactions handled by INLETS is related to inquiries about hazardous materials. This could involve requests for information, reporting of incidents, or any other communication related to hazardous materials.
11.
The Law Information Network of Kentucky maintains records on vehicle and boat registration, driver's licenses, and _______________.
Correct Answer
B. Carry concealed weapon permits
Explanation
The Law Information Network of Kentucky maintains records on vehicle and boat registration, driver's licenses, and carry concealed weapon permits. This means that the network keeps track of individuals who have been granted permits to carry concealed weapons in Kentucky. This information is important for law enforcement and public safety purposes, as it allows for the monitoring and regulation of concealed weapons in the state.
12.
NCIC services are available to all criminal justice agencies in all fifty states.
Correct Answer
A. True
Explanation
NCIC (National Crime Information Center) is a computerized database that provides criminal justice agencies with information on wanted persons, stolen property, and other criminal records. It is a nationwide system that is accessible to all criminal justice agencies in all fifty states. Therefore, the statement that NCIC services are available to all criminal justice agencies in all fifty states is true.
13.
In Kentucky, the Kentucky State Police has the statewide responsibility for AMBER Alert activation.
Correct Answer
A. True
Explanation
The given statement is true. In Kentucky, the Kentucky State Police is indeed responsible for the statewide activation of AMBER Alerts. AMBER Alerts are emergency messages that are issued in the most serious child abduction cases. They are intended to quickly alert the public and solicit their help in locating the abducted child and the suspect. The Kentucky State Police play a crucial role in coordinating and disseminating these alerts to ensure the safety and swift recovery of abducted children.
14.
What is a type of offline search that allows the officer to search transaction made by other NCIC users?
Correct Answer
B. Transaction log search
Explanation
A transaction log search is a type of offline search that allows an officer to search for transactions made by other NCIC users. This search can provide valuable information about previous transactions and activities conducted by other users, aiding in investigations and gathering evidence. By accessing the transaction log, officers can track and analyze the actions of individuals and identify any suspicious or illegal activities.
15.
What are the three types of offline searches available through NCIC?
Correct Answer
D. All of the answers are correct
Explanation
The three types of offline searches available through NCIC are purged records search, transaction log search, and hot file search. These searches allow users to access information that is not currently available online. Purged records search involves searching for information that has been removed from the online database but is still stored in the system. Transaction log search allows users to retrieve information about previous transactions and activities. Hot file search involves searching for information related to wanted persons, stolen property, or other urgent matters. All of these types of searches are correct and can be used to retrieve specific information from the NCIC system.
16.
Usernames are assigned by the agency and passwords are chosen by individual officer. Which of the following is true about passwords?
Correct Answer
B. Must be at least five characters long
Explanation
Passwords must be at least five characters long. This means that the minimum requirement for a password is to have five characters. There is no mention of any other specific requirements such as special characters or numbers, so as long as the password has at least five characters, it would be considered valid.
17.
Areas of concern that written policies must address are passwords, security, logging information, and ________________.
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above". When it comes to written policies, it is important to address various areas of concern. This includes passwords to ensure secure access to systems, security measures to protect sensitive information, logging information to track and monitor activities, and dial-up/remote access policies to regulate remote connections. By addressing all of these areas, organizations can establish comprehensive policies that promote security and compliance.
18.
All LINK transactions are logged electronically. These logs include which of the following?
Correct Answer
D. All of the answers are correct
Explanation
The correct answer is that all of the answers are correct. This means that all of the mentioned information - transaction requested, date and time, and operator terminal device - is included in the electronically logged transactions.
19.
The system automatically logs all transmissions from the MDT and maintains a message log for at least one year.
Correct Answer
A. True
Explanation
The given statement states that the system automatically logs all transmissions from the MDT (Mobile Data Terminal) and keeps a message log for at least one year. This means that every communication or message sent through the MDT is recorded and stored for a minimum of one year. Therefore, the answer "True" is correct as it aligns with the information provided in the statement.
20.
A query of the NCIC Vehicle file can be made using what information?
Correct Answer
D. All of the answers are correct
Explanation
The NCIC Vehicle file can be queried using various types of information, including the Vehicle Identification Number (VIN), License Plate Number, and Serial Number. All of these options are correct because any of these pieces of information can be used to search for and retrieve relevant data from the NCIC Vehicle file.
21.
A query of NCIC Gun file can result in records for stolen guns or what other classification of gun record?
Correct Answer
D. All of the answers are correct
Explanation
A query of the NCIC Gun file can result in records for stolen guns, lost guns, recovered guns, or felony guns. All of these classifications of gun records can be retrieved from the NCIC Gun file when querying it.
22.
A query of the NCIC Gun file must contain the serial number of the gun and _______________.
Correct Answer
D. All of the answers are correct
Explanation
The query of the NCIC Gun file must contain the serial number of the gun and all of the answers are correct. This means that in order to retrieve information from the NCIC Gun file, the query must include not only the serial number of the gun but also the make of the gun and the caliber of the gun. All three pieces of information are necessary to accurately identify and retrieve the desired information from the database.
23.
A query of the NCIC Article file can contain a brand name.
Correct Answer
B. False
Explanation
The NCIC Article file is a database that contains information about stolen or missing articles. It is primarily used by law enforcement agencies to track and recover stolen property. Since the purpose of the database is to identify and locate specific items, it does not include information about brand names. Therefore, a query of the NCIC Article file cannot contain a brand name.
24.
A query of the NCIC Article file must contain either the serial number of the article or an owner applied number and _____________.
Correct Answer
A. Type of article
Explanation
To query the NCIC Article file, it is necessary to include either the serial number of the article or an owner applied number. In addition to this requirement, the query must also include the type of article being searched for. This means that the correct answer is "Type of article." Including the type of article in the query helps to narrow down the search and retrieve more accurate results from the NCIC Article file.
25.
What data is needed to query a KY driver's license?
Correct Answer
D. All of the answers are acceptable
Explanation
All of the answers are acceptable because querying a KY driver's license requires multiple pieces of data to accurately identify and retrieve the information. The name and date of birth can be used to search for the license, the driver's license number is a unique identifier for the license, and the social security number can also be used to verify the identity of the individual. Therefore, any combination of these data points can be used to query a KY driver's license.
26.
A positive response on a Kentucky driver's license will also produce a wanted person check on the individual?
Correct Answer
A. True
Explanation
A positive response on a Kentucky driver's license means that there is some kind of issue or alert associated with the individual's license. This could be due to various reasons such as outstanding warrants, unpaid fines, or other legal issues. Therefore, it is likely that a positive response on a Kentucky driver's license will trigger a wanted person check on the individual to determine if they are wanted by law enforcement.
27.
An out of state driver's history query is not available on the MDT.
Correct Answer
A. True
Explanation
The given statement states that an out of state driver's history query is not available on the MDT. This means that the MDT (Mobile Data Terminal) does not have access to the driving history of out of state drivers. Therefore, the correct answer is True, indicating that the statement is true and out of state driver's history query cannot be accessed on the MDT.
28.
What data is needed to query an out of state driver's license?
Correct Answer
D. A and B only
Explanation
To query an out-of-state driver's license, both the name, date of birth, and sex of the driver, as well as the driver's license number are required. The name, date of birth, and sex help in identifying the specific individual, while the driver's license number is necessary to access the driver's license record. The social security number is not needed for this query.
29.
A driver's history will be returned on a KY driver's license response but not always returned on an out of state driver's license response.
Correct Answer
A. True
Explanation
The explanation for the given correct answer is that when a KY driver's license is requested, the driver's history will always be returned as part of the license response. However, when an out of state driver's license is requested, there is no guarantee that the driver's history will be included in the license response. Therefore, it is true that a driver's history will be returned on a KY driver's license response but not always on an out of state driver's license response.
30.
In order to verify all the information contained in the response the entering agency must be contacted to confirm the status of the record.
Correct Answer
A. True
Explanation
The statement suggests that in order to confirm the accuracy of the information provided in the response, it is necessary to contact the entering agency to verify the status of the record. This implies that the entering agency is the authoritative source of information and can provide the most reliable confirmation. Therefore, the answer "True" is correct as it aligns with the statement.
31.
All hit confirmation procedures for MDT operators will be handled through their LINK terminal agency.
Correct Answer
A. True
Explanation
The statement suggests that all hit confirmation procedures for MDT operators will be conducted through their LINK terminal agency. This implies that the LINK terminal agency is the designated platform or system through which MDT operators will verify and confirm hits. Therefore, the statement is true as it indicates that the hit confirmation process will exclusively occur via the LINK terminal agency.
32.
A potential hit becomes a valid hit once the inquiring agency has:
Correct Answer
C. Both A and B are correct
Explanation
A potential hit becomes a valid hit once the inquiring agency has confirmed that the person or property matches the information provided in the response (option A). Additionally, they need to ensure that the case file and/or warrant are active or outstanding and that extradition is authorized (option B). Both of these conditions need to be met for a potential hit to be considered a valid hit.
33.
A hit is a positive response to an inquiry transaction.
Correct Answer
A. True
Explanation
A hit refers to a positive response received when making an inquiry transaction. This means that when someone makes an inquiry, they will receive a hit as a confirmation or acknowledgement that their inquiry has been successfully processed. Therefore, the statement that a hit is a positive response to an inquiry transaction is true.
34.
A query of the NCIC Boat file can be made using what information?
Correct Answer
D. Both A and B
Explanation
A query of the NCIC Boat file can be made using both the Boat Hull Number and the Registration Number. Both of these pieces of information can be used to search for and retrieve relevant data and records from the NCIC Boat file. The Boat Hull Number is a unique identifier assigned to each boat, while the Registration Number is a unique identifier assigned to each registered boat. By using either of these numbers, one can access information about the boat, its owner, and any associated records in the NCIC Boat file.
35.
Statistics from recent years show a steady increase in the numbers and in some cases the numbers top weapons as the number one killer of on-duty officers.
Correct Answer
A. True
Explanation
The statement is true because statistics from recent years indicate that the numbers of on-duty officers being killed have been steadily increasing. In some cases, these numbers even surpass the deaths caused by weapons, making it the leading cause of death for on-duty officers.
36.
Officer safety concerns with use of mobile data terminal and vehicle operation continue to be a great concern facing today's law enforcement officers, administrators, and trainers.
Correct Answer
A. True
Explanation
The statement is true because officer safety concerns with the use of mobile data terminal and vehicle operation are indeed a significant issue for law enforcement officers, administrators, and trainers. The use of mobile data terminals in vehicles can be distracting and potentially dangerous, as it diverts the officer's attention away from the road. This can increase the risk of accidents and compromise officer safety. Therefore, it is crucial for law enforcement agencies to address these concerns and implement appropriate measures to ensure the safety of their officers.
37.
A wanted person query also searches which of the following files?
Correct Answer
D. All of the answers are correct
Explanation
The correct answer is "All of the answers are correct". A wanted person query searches all of the mentioned files, including the Foreign Fugitive File, Violent Gang and Terrorist Organization File, and Missing Person File. This is because these files contain information about individuals who are wanted or have outstanding warrants for various reasons. Therefore, conducting a wanted person query would involve searching all of these files to gather relevant information.
38.
An inquiry of the Wanted Person File may be made by name and one, more than one, or all of the following identifiers:
Correct Answer(s)
A. DOB
B. SSN
C. OLN
Explanation
The correct answer is DOB, SSN, OLN. When making an inquiry of the Wanted Person File, one can search by the person's name and any combination of the following identifiers: Date of Birth (DOB), Social Security Number (SSN), and Operator's License Number (OLN). This means that in order to find information on a wanted person, one can use their name along with their date of birth, social security number, and/or operator's license number to narrow down the search and obtain accurate results.