McAfee Certified Cyber Intelligence Investigator CCII Exam Practice Test

Page: 1 / 14
Total 130 questions
Question 1

The next step is a vulnerability assessment of probable targets.



Answer : A

A vulnerability assessment is critical in intelligence and cybersecurity investigations. It identifies potential weaknesses in systems, infrastructure, or individuals that could be exploited by threat actors.


Question 2

Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.



Answer : A

Ethical hacking, also known aspenetration testing, is a legal and structured process where cybersecurity professionalssimulate attacksto find and fix security vulnerabilities. Ethical hackers:

Identify weaknessesin networks, applications, and infrastructure.

Help organizations strengthen securityby recommending solutions.

Use the same tools as malicious hackers, but with permission and legal authority.

Ethical hacking iswidely used in cybersecurity auditsto protect businesses, governments, and individuals from cyber threats.


Question 3

Tactical intelligence is considered actionable intelligence about imminent or near-term threats that is disseminated to the line functions of law enforcement.



Answer : A

Tactical intelligencefocuses onimmediate threats that require quick action. It is:

Directly shared with field officers, SWAT teams, and emergency responders.

Used in counterterrorism, cybercrime investigations, and rapid deployment operations.

Time-sensitive and specific to particular events or individuals.

Example: If anactive shooterorhacker targeting a critical infrastructureis detected, tactical intelligence is used tomobilize security teams quickly.


Question 4

Intelligence personnel must never save the search results that satisfy the research objective as it has no bearing on a case.



Answer : B

Savingsearch results, screenshots, and metadatais critical forevidence preservationin OSINT investigations. Investigators must:

Document findingsfor verification.

Maintain chain of custodyfor legal admissibility.

Ensure evidence integritythrough timestamping and forensic validation.

Failure to save results canjeopardize case validity.


McAfee Institute OSINT Techniques Guide

Federal Digital Evidence Collection Procedures

DOJ Cyber Intelligence Training

Question 5

What is the most trusted type of proxy server?



Answer : A

High Anonymity Proxies (Elite Proxies)provide the highest level of privacy bymasking the user's IP address completely. They are used incyber investigations, OSINT operations, and privacy-focused communicationsto preventtracking and monitoring.


Question 6

What is the number one type of online fraud?



Answer : A

Identity theftis themost common type of online fraud, affecting millions of people worldwide each year. Cybercriminals stealpersonal and financial informationto:

Openfraudulent bank accounts.

Makeunauthorized transactionsusing stolen credit card details.

Conductloan fraudor apply for government benefits.

Common methods used for identity theft include:

Phishing attacks(fraudulent emails and fake websites).

Data breaches(hacking into databases to steal personal records).

Social engineering(manipulating people into revealing sensitive data).


Question 7

Investigators may legally impersonate a false identity online during OSINT investigations.



Answer : B

While some law enforcement agencies may havelegal exemptions, impersonation can violate:

Terms of Service (TOS) agreementson social media platforms.

State and federal laws, such as fraud statutes.

Ethical guidelines, especially for private investigators.

In most cases,OSINT must be conducted using publicly available information, rather than deception or false identities.


Page:    1 / 14   
Total 130 questions