McAfee Certified Cyber Intelligence Investigator CCII Exam Practice Test

Page: 1 / 14
Total 130 questions
Question 1

What is shill bidding?



Answer : C

Shill biddingis anillegal auction practicewhere sellers usefake accounts or associatestoartificially increase the priceof an item. Thismisleads real buyers into overpaying. It is a common type offraud in online auctions like eBayand is a violation ofplatform policies and fraud laws.


Question 2

What is the most commonly used email domain for fraud?



Answer : A

Fraudsters frequently useYahoo.comdue to itslax verification requirements and historical use in cybercrime rings.


Question 3

What is non-delivery of goods?



Answer : C

Non-delivery of goods fraudhappens when afraudster advertises an item, accepts payment, but never delivers it. This scam is frequently seen inonline retail fraud, e-commerce platforms, and fake dropshipping schemes.


Question 4

What is the information often contained in a photographic image?



Answer : A

Metadata (EXIF Data)is embedded in digital images and provides valuable details such as:

Date and time of the photo.

Camera model and settings.

GPS coordinates of where the photo was taken.

This information is used inOSINT investigationsto track locations andverify the authenticity of images. However, criminals mayremove metadata to hide their tracks.


Question 5

What is Organized Retail Crime (ORC)?



Answer : D

Organized Retail Crime (ORC)refers tocoordinated theft ringsthat steal merchandise in bulk and resell iton online platforms, black markets, and dark web marketplaces. These crimescause billions in lossesfor retailers annually.


Question 6

Just like a hostname can be changed, a MAC address can also be changed through a process called MAC Spoofing.



Answer : A

MAC spoofingallows attackers tochange their network identity, making tracking harder.Cybercriminals use it to:

Bypass network security measures(e.g., MAC filtering).

Evade law enforcement trackingin cyber investigations.

Appear as another devicein network logs.


Question 7

Before evidence can be presented in court, it must be competent, relevant, and material to the issue and must be presented in compliance with the rules of evidence.



Answer : A

For digital evidence to beadmissible in court, it must meet three key criteria:

Competence-- Evidence must be authentic and legally obtained.

Relevance-- Evidence must relate to the case.

Materiality-- Evidence must have a direct impact on proving an element of the crime.

Failure to meet these criteria may result inevidence exclusion.


McAfee Institute Digital Evidence Standards

DOJ Federal Rules of Evidence

Cyber Investigations Legal Framework

Page:    1 / 14   
Total 130 questions