Special Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

McAfee CCII Dumps

Page: 1 / 13
Total 130 questions

Certified Cyber Intelligence Investigator (CCII) Questions and Answers

Question 1

A virus is a program that attaches itself to a program or file. This allows it to spread across networks and cause damage to software and hardware.

Options:

A.

True

B.

False

Question 2

In Rosenberg v. Collins, the court held that if the computer output is used in the regular course of business, the evidence shall be admitted.

Options:

A.

True

B.

False

Question 3

Homeland Security is prosecuting international cases of human trafficking.

Options:

A.

True

B.

False

Question 4

The first broad class is the "application of intelligence," which deals with knowledge related to a specific crime. Intelligence analysis that produces information about new methods and indicators in the uses of improvised explosive devices (IED) by jihadists, for example, is the "application of intelligence."

Options:

A.

True

B.

False

Question 5

Investigators may legally impersonate a false identity online during OSINT investigations.

Options:

A.

True

B.

False

Question 6

NSI embodies both policy intelligence and central intelligence.

Options:

A.

True

B.

False

Question 7

There are no laws that require an ISP to maintain their data for a length of time.

Options:

A.

True

B.

False

Question 8

Which one of the following methods best reflects how thieves stash their stolen goods?

Options:

A.

At McDonald's in the bathroom

B.

Back alleys were used to stash and to transport stolen goods by thieves on foot

C.

Stolen goods are never dumped or stashed

Question 9

Which of the following is the most effective method for verifying a suspect’s online identity?

Options:

A.

Checking multiple social media accounts for consistency

B.

Using a single source for confirmation

C.

Relying on unverified third-party information

D.

Assuming identity based on email address alone

Question 10

GSM stands for Global System for Mobile Communications.

Options:

A.

True

B.

False

Question 11

Computer crimes can be separated into two categories:

Options:

A.

Crimes facilitated by a computer and crimes where a computer or network is the target

B.

Crimes where an animal was involved and crimes not on the internet

Question 12

What is the number one type of online fraud?

Options:

A.

Identity Theft

B.

Non-Delivery of Goods

C.

Credit Card Fraud

D.

Auction Fraud

Question 13

Often, "information sharing" and "intelligence sharing" are used interchangeably by persons who do not understand the subtleties—yet importance—of the distinction.

Options:

A.

True

B.

False

Question 14

How do online fraudsters hide their identities?

Options:

A.

Fake Profiles

B.

Fake Identities

C.

Using prepaid Credit Cards

D.

Anonymous or Free Email Services

E.

Proxy Servers

F.

All of the Above

Question 15

The next step is a vulnerability assessment of probable targets.

Options:

A.

True

B.

False

Question 16

State and local law enforcement have held the primary responsibility for investigating and prosecuting organized retail crime.

Options:

A.

True

B.

False

Question 17

Four types of computer-generated evidence are:

Visual output on the monitor

Printed evidence on a printer

Printed evidence on a plotter

Film recorder (to include optical drive and media).

Options:

A.

True

B.

False

Question 18

The CCII program and manual should be viewed as a living document and learning environment.

Options:

A.

True

B.

False

Question 19

It is NOT important to capture the URLs of a potential suspect's social media account.

Options:

A.

True

B.

False

Question 20

How is a privacy policy used in social networks?

Options:

A.

To protect members' information

B.

To set guidelines on how information will be shared

C.

All of the above

Question 21

What is the best way to collect evidence from an online forum without alerting suspects?

Options:

A.

Taking screenshots and downloading web pages

B.

Posting in the forum to gather information

C.

Using automation tools to scrape all data at once

D.

Contacting the forum administrator immediately

Question 22

You should always take screen captures of a suspect's profile online to preserve it as potential evidence.

Options:

A.

True

B.

False

Question 23

Hearsay is second-hand evidence – which means it is not gathered from the personal knowledge of the witness but from other sources.

Options:

A.

True

B.

False

Question 24

What is Organized Retail Crime (ORC)?

Options:

A.

The sale of stolen merchandise online

B.

The stealing of retail merchandise, by multiple perpetrators

C.

The act of stealing merchandise for profit

D.

All of the above

Question 25

A UICC does contain volatile and non-volatile memory.

Options:

A.

True

B.

False

Question 26

The most common types of evidence include:

Options:

A.

Direct

B.

Documentary

C.

Demonstrative

D.

All of the above

Question 27

The United States Secret Service (USSS) is responsible for financial crimes around the United States.

Options:

A.

True

B.

False

Question 28

Operational intelligence is considered:

Options:

A.

Information that can be used for military operations

B.

Actionable intelligence about long-term threats that is used to develop and implement preventive responses

Question 29

Non-delivery of goods is when a seller doesn’t receive money for a product ordered by a buyer.

Options:

A.

True

B.

False

Question 30

Preservation of physical and digital evidence is mandatory for a successful investigation.

Options:

A.

True

B.

False

Question 31

Which of the following is a well-known search engine used for OSINT investigations?

Options:

A.

Dogpyle

B.

Dogpile

Question 32

A worm is almost similar to a virus, except that it doesn't need the execution of any executable file to get activated.

Options:

A.

True

B.

False

Question 33

One of the most important weapons in a cybercrime investigator’s arsenal is a letter requesting that the ISP preserve the data.

Options:

A.

True

B.

False

Question 34

Federal law enforcement can only gather proprietary information concerning an incident in the following ways:

Options:

A.

Request for voluntary disclosure of information

B.

Court order

C.

Federal grand jury subpoena

D.

Search warrant

E.

All of the above

Question 35

The phrase "law enforcement intelligence," used synonymously with "criminal intelligence," refers to law enforcement’s responsibility to enforce the criminal law.

Options:

A.

True

B.

False

Question 36

Just like a hostname can be changed, a MAC address can also be changed through a process called MAC Spoofing.

Options:

A.

True

B.

False

Question 37

To ensure that only relevant and reliable evidence is entered into the proceedings, the judicial system has adopted the following concept of admissibility:

Options:

A.

Relevancy of evidence

B.

Reliability of evidence

C.

Both of the above

Question 38

Tactical intelligence is considered actionable intelligence about imminent or near-term threats that is disseminated to the line functions of law enforcement.

Options:

A.

True

B.

False

Question 39

The preservation letter does not legally require the ISP to turn over its records.

Options:

A.

True

B.

False

Page: 1 / 13
Total 130 questions