Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CCII Certified Cyber Intelligence Investigator (CCII) Questions and Answers

Questions 4

What is the best way to collect evidence from an online forum without alerting suspects?

Options:

A.

Taking screenshots and downloading web pages

B.

Posting in the forum to gather information

C.

Using automation tools to scrape all data at once

D.

Contacting the forum administrator immediately

Buy Now
Questions 5

What is an escrow service?

Options:

A.

A company that holds your money in good faith while an item is shipped

B.

A place to find a date

C.

A local bar

Buy Now
Questions 6

What is a privacy policy?

Options:

A.

A policy no one reads

B.

A policy that helps establish how your personal information is handled

Buy Now
Questions 7

Hostnames are the system names assigned by a computer by the system, user, or owner.

Options:

A.

True

B.

False

Buy Now
Questions 8

You can access the profile of a subject if they are represented by legal counsel.

Options:

A.

True

B.

False

Buy Now
Questions 9

The United States Secret Service was originally created to:

Options:

A.

Investigate and prevent the counterfeiting of US currency

B.

Protect the President of the United States

C.

Protect the Vice President of the United States

Buy Now
Questions 10

If you have no luck identifying a subject on a social network, try adjusting your regional settings and change your location. Sometimes, the user's privacy settings are set to only show their profile to users in the same geographical location.

Options:

A.

True

B.

False

Buy Now
Questions 11

Prevention involves gaining or developing information related to threats of crime or terrorism and using it to apprehend offenders, harden targets, and use strategies that will eliminate or mitigate the threats.

Options:

A.

True

B.

False

Buy Now
Questions 12

You are simply awesome and 100k forward to this phenomenal training and certification program!

Options:

A.

True

B.

False

Buy Now
Questions 13

In Rosenberg v. Collins, the court held that if the computer output is used in the regular course of business, the evidence shall be admitted.

Options:

A.

True

B.

False

Buy Now
Questions 14

Every state has the same laws and procedures that pertain to the investigation and prosecution of computer crimes.

Options:

A.

True

B.

False

Buy Now
Questions 15

What is the information often contained in a photographic image?

Options:

A.

Meta Information

B.

Photo Data

Buy Now
Questions 16

One of the most important weapons in a cybercrime investigator’s arsenal is a letter requesting that the ISP preserve the data.

Options:

A.

True

B.

False

Buy Now
Questions 17

Which of the following is a common OSINT tool used for gathering domain information?

Options:

A.

WHOIS Lookup

B.

Virtual Private Networks (VPNs)

C.

Dark web marketplaces

D.

Google Translate

Buy Now
Questions 18

Information may be defined as "pieces of raw, unanalyzed data that identify persons, organizations, evidence, events, or illustrate processes that indicate the incidence of a criminal event or witness or evidence of a criminal event."

Options:

A.

True

B.

False

Buy Now
Questions 19

What is the general modus operandi for thieves selling & transporting stolen goods?

Options:

A.

Many thieves had around 20-30 people and retail outlets where they felt they could "safely" sell stolen goods.

B.

Fences liked to sell goods out of their houses.

C.

Boosters are the best at selling counterfeit goods.

Buy Now
Questions 20

You do not need a subpoena to request user information from Facebook.

Options:

A.

True

B.

False

Buy Now
Questions 21

When examining feedback systems for fraud, what do we always use?

Options:

A.

The first 30 days of feedback

B.

The last days of feedback

C.

The mean of items sold

Buy Now
Questions 22

Please select the most popular types of hackers:

Options:

A.

White Hat

B.

Grey Hat

C.

Black Hat

D.

All of the above

Buy Now
Questions 23

Direct evidence is written testimony, where the knowledge is obtained from any of the witness’s five senses.

Options:

A.

True

B.

False

Buy Now
Questions 24

Operational intelligence is considered:

Options:

A.

Information that can be used for military operations

B.

Actionable intelligence about long-term threats that is used to develop and implement preventive responses

Buy Now
Questions 25

Hearsay is second-hand evidence—evidence that is not gathered from the personal knowledge of the witness but from another source.

Options:

A.

True

B.

False

Buy Now
Questions 26

State and local law enforcement have held the primary responsibility for investigating and prosecuting organized retail crime.

Options:

A.

True

B.

False

Buy Now
Questions 27

A forensic examiner should always turn off a mobile device at the time of seizure and before starting an acquisition.

Options:

A.

True

B.

False

Buy Now
Questions 28

Non-delivery of goods is when a seller doesn’t receive money for a product ordered by a buyer.

Options:

A.

True

B.

False

Buy Now
Questions 29

Fraudsters never manipulate feedback on auction sites.

Options:

A.

True

B.

False

Buy Now
Questions 30

What is the amount of losses retailers lose to Organized Retail Crime (ORC) each year according to the National Retail Federation?

Options:

A.

$2-$5 Billion

B.

$1M-$500 Million

Buy Now
Questions 31

Just like a hostname can be changed, a MAC address can also be changed through a process called MAC Spoofing.

Options:

A.

True

B.

False

Buy Now
Questions 32

Which of the following is a well-known search engine used for OSINT investigations?

Options:

A.

Dogpyle

B.

Dogpile

Buy Now
Questions 33

If an investigator can positively identify an online identity as belonging to a specific suspect, the investigator might also be able to develop further leads about co-conspirators based on other identities contained in their friend's network.

Options:

A.

True

B.

False

Buy Now
Questions 34

Federal law enforcement can only gather proprietary information concerning an incident in the following ways:

Options:

A.

Request for voluntary disclosure of information

B.

Court order

C.

Federal grand jury subpoena

D.

Search warrant

E.

All of the above

Buy Now
Questions 35

A UICC does contain volatile and non-volatile memory.

Options:

A.

True

B.

False

Buy Now
Questions 36

Physical evidence includes things like computers, tools, hardware, or perishable evidence capable of reproduction.

Options:

A.

True

B.

False

Buy Now
Questions 37

What is the most trusted type of proxy server?

Options:

A.

High Anonymity Proxy (Elite Proxy)

B.

Anonymous Proxy Server

C.

Distorting Proxy Server

Buy Now
Questions 38

Which technique is used for profiling individuals during an investigation?

Options:

A.

Social Media Analysis

B.

IP Tracking

C.

Facial Recognition

D.

All of the above

Buy Now
Questions 39

War dialers are tools used to automatically scan phone numbers in search of unsecured modems and fax machines.

Options:

A.

True

B.

False

Buy Now
Exam Code: CCII
Exam Name: Certified Cyber Intelligence Investigator (CCII)
Last Update: May 21, 2026
Questions: 130

PDF + Testing Engine

$64.99  $185.69

Testing Engine

$49.99  $142.83
buy now CCII testing engine

PDF (Q&A)

$54.99  $157.11
buy now CCII pdf