McAfee CCII Certified Cyber Intelligence Investigator Exam Practice Test

Page: 1 / 14
Total 130 questions
Question 1

Thieves, in general, are motivated to steal and sell goods because they can quickly convert them for money.



Answer : A

The primarymotivation behind theftis the ability toquickly convert stolen goods into cash. This is seen in:

Pawn shop transactions

Online marketplaces (e.g., eBay, Facebook Marketplace)

Dark web black markets

Selling through fences (middlemen who resell stolen goods)Quick conversion reduces the chance oflaw enforcement tracking the stolen goodsand makestheft an attractive, high-profit crimefor criminals.


Question 2

How do online fraudsters hide their identities?



Answer : F

Fraudstersuse multiple techniques to remain anonymousand evade detection, including:

Fake identities and accountsto mask real information

Prepaid credit cardsfor untraceable transactions

Anonymous email servicesto avoid linking accounts

Proxy servers and VPNsto hide IP addresses


Question 3

Intelligence personnel must never save the search results that satisfy the research objective as it has no bearing on a case.



Answer : B

Savingsearch results, screenshots, and metadatais critical forevidence preservationin OSINT investigations. Investigators must:

Document findingsfor verification.

Maintain chain of custodyfor legal admissibility.

Ensure evidence integritythrough timestamping and forensic validation.

Failure to save results canjeopardize case validity.


McAfee Institute OSINT Techniques Guide

Federal Digital Evidence Collection Procedures

DOJ Cyber Intelligence Training

Question 4

Every state has the same laws and procedures that pertain to the investigation and prosecution of computer crimes.



Answer : B

Cybercrime lawsvary by statein the U.S. and internationally. Different jurisdictions havedifferent statutes, regulations, and prosecutorial approaches. For example:

Californiahas theCalifornia Consumer Privacy Act (CCPA).

New Yorkhasspecific cybersecurity regulationsfor financial institutions.

European nationshaveGDPR, whilethe U.S. has fragmented federal and state laws.

Investigators must beaware of regional cyber lawsto ensure compliance.


McAfee Institute Cyber Law and Investigations Guide

Question 5

Those forced to travel and steal did so because they were too well known locally, but they normally returned to their local area in order to sell.



Answer : A

Many thieves and organized retail crime rings operateacross multiple jurisdictionsto avoid law enforcement detection. However, they often return to theirhome territory to sell goods, where they havetrusted contacts, fences, or buyers.


Question 6

The next step is a vulnerability assessment of probable targets.



Answer : A

A vulnerability assessment is critical in intelligence and cybersecurity investigations. It identifies potential weaknesses in systems, infrastructure, or individuals that could be exploited by threat actors.


Question 7

Investigators may legally impersonate a false identity online during OSINT investigations.



Answer : B

While some law enforcement agencies may havelegal exemptions, impersonation can violate:

Terms of Service (TOS) agreementson social media platforms.

State and federal laws, such as fraud statutes.

Ethical guidelines, especially for private investigators.

In most cases,OSINT must be conducted using publicly available information, rather than deception or false identities.


Page:    1 / 14   
Total 130 questions