Special Summer Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

CCII Certified Cyber Intelligence Investigator (CCII) Questions and Answers

Questions 4

Just like a hostname can be changed, a MAC address can also be changed through a process called MAC Spoofing.

Options:

A.

True

B.

False

Buy Now
Questions 5

The Best Evidence Rule was established to deter any alteration of evidence, either intentionally or unintentionally.

Options:

A.

True

B.

False

Buy Now
Questions 6

Four types of computer-generated evidence are:

Visual output on the monitor

Printed evidence on a printer

Printed evidence on a plotter

Film recorder (to include optical drive and media).

Options:

A.

True

B.

False

Buy Now
Questions 7

What is informal discovery?

Options:

A.

Factual research obtained without document requests, interrogatories, subpoenas, or depositions.

B.

Information collected only through legal means.

Buy Now
Questions 8

The first broad class is the "application of intelligence," which deals with knowledge related to a specific crime. Intelligence analysis that produces information about new methods and indicators in the uses of improvised explosive devices (IED) by jihadists, for example, is the "application of intelligence."

Options:

A.

True

B.

False

Buy Now
Questions 9

Non-delivery of goods is when a seller doesn’t receive money for a product ordered by a buyer.

Options:

A.

True

B.

False

Buy Now
Questions 10

Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.

Options:

A.

True

B.

False

Buy Now
Questions 11

Hearsay is second-hand evidence—evidence that is not gathered from the personal knowledge of the witness but from another source.

Options:

A.

True

B.

False

Buy Now
Questions 12

The CCII program and manual should be viewed as a living document and learning environment.

Options:

A.

True

B.

False

Buy Now
Questions 13

What is the general modus operandi for thieves selling & transporting stolen goods?

Options:

A.

Many thieves had around 20-30 people and retail outlets where they felt they could "safely" sell stolen goods.

B.

Fences liked to sell goods out of their houses.

C.

Boosters are the best at selling counterfeit goods.

Buy Now
Questions 14

Direct evidence is written testimony, where the knowledge is obtained from any of the witness’s five senses.

Options:

A.

True

B.

False

Buy Now
Questions 15

What is shill bidding?

Options:

A.

Buying an item online

B.

Going out to eat with a friend

C.

Increasing the bid on an item with another account so that you can drive the price up

Buy Now
Questions 16

Electronic evidence can be easily manipulated, making it crucial for investigators to follow strict digital forensic procedures.

Options:

A.

True

B.

False

Buy Now
Questions 17

A worm is almost similar to a virus, except that it doesn't need the execution of any executable file to get activated.

Options:

A.

True

B.

False

Buy Now
Questions 18

The United States Secret Service was originally created to:

Options:

A.

Investigate and prevent the counterfeiting of US currency

B.

Protect the President of the United States

C.

Protect the Vice President of the United States

Buy Now
Questions 19

If you have no luck identifying a subject on a social network, try adjusting your regional settings and change your location. Sometimes, the user's privacy settings are set to only show their profile to users in the same geographical location.

Options:

A.

True

B.

False

Buy Now
Questions 20

It is often better to use a screen recording software (e.g., Camtasia) instead of taking screenshots.

Options:

A.

True

B.

False

Buy Now
Questions 21

Which technique is used for profiling individuals during an investigation?

Options:

A.

Social Media Analysis

B.

IP Tracking

C.

Facial Recognition

D.

All of the above

Buy Now
Questions 22

You are simply awesome and 100k forward to this phenomenal training and certification program!

Options:

A.

True

B.

False

Buy Now
Questions 23

The larger the standard deviation between two-like items a seller has sold, the more likely it is to be stolen.

Options:

A.

True

B.

False

Buy Now
Questions 24

When examining feedback systems for fraud, what do we always use?

Options:

A.

The first 30 days of feedback

B.

The last days of feedback

C.

The mean of items sold

Buy Now
Questions 25

Homeland Security is prosecuting international cases of human trafficking.

Options:

A.

True

B.

False

Buy Now
Questions 26

The intent of this training & certification program is to provide a perspective and guidance for the development and delivery of cyber intelligence training for law enforcement and fraud professionals.

Options:

A.

True

B.

False

Buy Now
Questions 27

Is accessing someone’s social network against the law?

Options:

A.

Yes

B.

No

Buy Now
Questions 28

How many social networks does an average person have?

Options:

A.

2.5

B.

4

C.

1

D.

3

E.

5

Buy Now
Questions 29

Investigators should always rely on screenshots as primary evidence in cyber investigations.

Options:

A.

True

B.

False

Buy Now
Questions 30

A virus is a program that attaches itself to a program or file. This allows it to spread across networks and cause damage to software and hardware.

Options:

A.

True

B.

False

Buy Now
Questions 31

One of the most important weapons in a cybercrime investigator’s arsenal is a letter requesting that the ISP preserve the data.

Options:

A.

True

B.

False

Buy Now
Questions 32

In general, hearsay evidence is not admissible in court.

Options:

A.

True

B.

False

Buy Now
Questions 33

ICE has been taking a heavy stance and prosecuting Organized Retail Crime (ORC).

Options:

A.

True

B.

False

Buy Now
Questions 34

Prevention involves gaining or developing information related to threats of crime or terrorism and using it to apprehend offenders, harden targets, and use strategies that will eliminate or mitigate the threats.

Options:

A.

True

B.

False

Buy Now
Questions 35

Which of the following is a commonOSINT toolused for gathering domain information?

Options:

A.

WHOIS Lookup

B.

Virtual Private Networks (VPNs)

C.

Dark web marketplaces

D.

Google Translate

Buy Now
Questions 36

Preservation of physical and digital evidence is mandatory for a successful investigation.

Options:

A.

True

B.

False

Buy Now
Questions 37

What technique can be used totrack cryptocurrency transactionsin cybercrime investigations?

Options:

A.

Blockchain analysis

B.

Reverse IP lookup

C.

Dark web forums

D.

Phishing attacks

Buy Now
Questions 38

"Fruit of the Poisonous Tree" relates to when an illegal search has been conducted to collect evidence in violation of the Fourth Amendment.

Options:

A.

True

B.

False

Buy Now
Questions 39

What is the best way to collect evidence from an online forum without alerting suspects?

Options:

A.

Taking screenshots and downloading web pages

B.

Posting in the forum to gather information

C.

Using automation tools to scrape all data at once

D.

Contacting the forum administrator immediately

Buy Now
Exam Code: CCII
Exam Name: Certified Cyber Intelligence Investigator (CCII)
Last Update: Mar 29, 2025
Questions: 130

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now CCII testing engine

PDF (Q&A)

$31.5  $104.99
buy now CCII pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 03 Apr 2025