McAfee Certified Cyber Intelligence Investigator CCII Exam Questions

Page: 1 / 14
Total 130 questions
Question 1

Fraudsters never manipulate feedback on auction sites.



Answer : B

Fraudsters commonlycreate fake positive reviews, use bot accounts, and manipulate transaction historyto deceive buyers into trusting fraudulent listings.


Question 2

What is informal discovery?



Answer : A

Informal discoveryrefers to gatheringopen-source intelligence (OSINT)or public recordswithout requiring legal proceduressuch as subpoenas or court orders. Examples include:

Searching public databases(e.g., business registrations, real estate records).

Analyzing social media profilesand publicly shared content.

Reviewing publicly available court records and news archives.

Investigators use informal discovery before proceeding toformal legal requests for restricted information.


Question 3

What resources can aid in social network investigations?



Answer : A, B, C, D, E

Social network investigations require multiple resources to gather intelligence on a subject.

Data mininginvolves extracting useful patterns and connections from large sets of social media data.

Profile informationprovides direct insights into the target's interests, activities, and affiliations.

User demographicshelp in analyzing behavioral trends and connections.

Googleaids in cross-referencing information found on social networks with other sources.

Social media monitoring servicesautomate the process of collecting and analyzing public data from social networks.These resources are vital for intelligence operations, cybercrime investigations, and threat assessments.


Question 4

Often, "information sharing" and "intelligence sharing" are used interchangeably by persons who do not understand the subtleties---yet importance---of the distinction.



Answer : A

Information sharing refers to the exchange of raw data among agencies or organizations. Intelligence sharing, on the other hand, means processed and analyzed data that provides actionable insights. In cyber intelligence investigations, intelligence sharing ensures that classified or sensitive data is properly handled and disseminated to relevant stakeholders.


Question 5

The phrase "law enforcement intelligence," used synonymously with "criminal intelligence," refers to law enforcement's responsibility to enforce the criminal law.



Answer : A

Law enforcement intelligence (LEI)is a branch of intelligence focusing oncriminal investigations, counterterrorism, and public safety enforcement. It encompasses data collection,covert operations, surveillance, and predictive analyticsto enhance law enforcement's capability to prevent and prosecute crimes.


Question 6

Information may be defined as "pieces of raw, unanalyzed data that identify persons, organizations, evidence, events, or illustrate processes that indicate the incidence of a criminal event or witness or evidence of a criminal event."



Answer : A

Raw data and observations collected during investigations are classified as information. When properly analyzed, structured, and contextualized, this information transforms into intelligence, which is actionable for investigations and decision-making. Understanding this difference is critical in cyber intelligence investigations, where data mining and OSINT techniques play a crucial role.


Question 7

Hostnames are the system names assigned by a computer by the system, user, or owner.



Answer : A

Ahostnameis aunique identifier assigned to a computer on a network.

Used innetwork security and OSINT investigationstotrack users and devices.

Law enforcement can subpoena ISPsto obtainhostname logs and associated IPsin cyber investigations.


Page:    1 / 14   
Total 130 questions