Special Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CCII Certified Cyber Intelligence Investigator (CCII) Questions and Answers

Questions 4

"Fruit of the Poisonous Tree" relates to when an illegal search has been conducted to collect evidence in violation of the Fourth Amendment.

Options:

A.

True

B.

False

Buy Now
Questions 5

A forensic investigator must follow the chain of custody when handling digital evidence.

Options:

A.

True

B.

False

Buy Now
Questions 6

The most common forms of evidence are direct, real, documentary, and demonstrative.

Options:

A.

True

B.

False

Buy Now
Questions 7

Which one of the following methods best reflects how thieves stash their stolen goods?

Options:

A.

At McDonald's in the bathroom

B.

Back alleys were used to stash and to transport stolen goods by thieves on foot

C.

Stolen goods are never dumped or stashed

Buy Now
Questions 8

Physical evidence includes things like computers, tools, hardware, or perishable evidence capable of reproduction.

Options:

A.

True

B.

False

Buy Now
Questions 9

Thieves, in general, are motivated to steal and sell goods because they can quickly convert them for money.

Options:

A.

True

B.

False

Buy Now
Questions 10

There are no laws that require an ISP to maintain their data for a length of time.

Options:

A.

True

B.

False

Buy Now
Questions 11

It is often better to use a screen recording software (e.g., Camtasia) instead of taking screenshots.

Options:

A.

True

B.

False

Buy Now
Questions 12

What is the amount of losses retailers lose to Organized Retail Crime (ORC) each year according to the National Retail Federation?

Options:

A.

$2-$5 Billion

B.

$1M-$500 Million

Buy Now
Questions 13

Direct evidence is called to eliminate a specific act.

Options:

A.

True

B.

False

Buy Now
Questions 14

What is a privacy policy?

Options:

A.

A policy no one reads

B.

A policy that helps establish how your personal information is handled

Buy Now
Questions 15

Is accessing someone’s social network against the law?

Options:

A.

Yes

B.

No

Buy Now
Questions 16

Which of the following is a commonOSINT toolused for gathering domain information?

Options:

A.

WHOIS Lookup

B.

Virtual Private Networks (VPNs)

C.

Dark web marketplaces

D.

Google Translate

Buy Now
Questions 17

NSI embodies both policy intelligence and central intelligence.

Options:

A.

True

B.

False

Buy Now
Questions 18

Once evidence is seized, the next step is to provide for its accountability and protection.

Options:

A.

True

B.

False

Buy Now
Questions 19

Shoplifters who used drugs and traveled by train often bought tickets.

Options:

A.

True

B.

False

Buy Now
Questions 20

Fraudsters never manipulate feedback on auction sites.

Options:

A.

True

B.

False

Buy Now
Questions 21

Homeland Security is prosecuting international cases of human trafficking.

Options:

A.

True

B.

False

Buy Now
Questions 22

What value does a friend's list bring to your investigation?

Options:

A.

Tells you what kind of people they date

B.

It might present possible accomplices or additional persons of interest

C.

They bring no value

Buy Now
Questions 23

A forensic examiner should always turn off a mobile device at the time of seizure and before starting an acquisition.

Options:

A.

True

B.

False

Buy Now
Questions 24

Electronic evidence can be easily manipulated, making it crucial for investigators to follow strict digital forensic procedures.

Options:

A.

True

B.

False

Buy Now
Questions 25

Just like a hostname can be changed, a MAC address can also be changed through a process called MAC Spoofing.

Options:

A.

True

B.

False

Buy Now
Questions 26

Regardless of the type of intelligence, the single function that permeates all activities is the Intelligence Process (also known as the Intelligence Cycle).

Options:

A.

True

B.

False

Buy Now
Questions 27

Please indicate the best method for saving electronic records of the search results:

Options:

A.

Screen recording software

B.

Bookmark

C.

Save webpage

Buy Now
Questions 28

What is Organized Retail Crime (ORC)?

Options:

A.

The sale of stolen merchandise online

B.

The stealing of retail merchandise, by multiple perpetrators

C.

The act of stealing merchandise for profit

D.

All of the above

Buy Now
Questions 29

Four types of computer-generated evidence are:

Visual output on the monitor

Printed evidence on a printer

Printed evidence on a plotter

Film recorder (to include optical drive and media).

Options:

A.

True

B.

False

Buy Now
Questions 30

GSM stands for Global System for Mobile Communications.

Options:

A.

True

B.

False

Buy Now
Questions 31

What benefit do fraudsters obtain by manipulating feedback systems?

Options:

A.

The ability to sell in shorter durations of time

B.

Established trust

C.

The ability to sell multiple quantities of like items

D.

The ability to use multiple accounts to carry out fraud schemes

E.

All of the above

Buy Now
Questions 32

In Rosenberg v. Collins, the court held that if the computer output is used in the regular course of business, the evidence shall be admitted.

Options:

A.

True

B.

False

Buy Now
Questions 33

You should always take screen captures of a suspect's profile online to preserve it as potential evidence.

Options:

A.

True

B.

False

Buy Now
Questions 34

All social media websites have strict privacy settings to protect their users.

Options:

A.

True

B.

False

Buy Now
Questions 35

Which technique is used for profiling individuals during an investigation?

Options:

A.

Social Media Analysis

B.

IP Tracking

C.

Facial Recognition

D.

All of the above

Buy Now
Questions 36

Every state has the same laws and procedures that pertain to the investigation and prosecution of computer crimes.

Options:

A.

True

B.

False

Buy Now
Questions 37

A trojan is a program pretending to be like useful software, while its actual strategy is to access, steal, or destroy user data and access authorization.

Options:

A.

True

B.

False

Buy Now
Questions 38

The larger the standard deviation between two-like items a seller has sold, the more likely it is to be stolen.

Options:

A.

True

B.

False

Buy Now
Questions 39

Which of the following is the most effective method for verifying a suspect’s online identity?

Options:

A.

Checking multiple social media accounts for consistency

B.

Using a single source for confirmation

C.

Relying on unverified third-party information

D.

Assuming identity based on email address alone

Buy Now
Exam Code: CCII
Exam Name: Certified Cyber Intelligence Investigator (CCII)
Last Update: Mar 24, 2025
Questions: 130

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now CCII testing engine

PDF (Q&A)

$36.75  $104.99
buy now CCII pdf