CCII Certified Cyber Intelligence Investigator (CCII) Questions and Answers
What is the best way to collect evidence from an online forum without alerting suspects?
Hostnames are the system names assigned by a computer by the system, user, or owner.
You can access the profile of a subject if they are represented by legal counsel.
If you have no luck identifying a subject on a social network, try adjusting your regional settings and change your location. Sometimes, the user's privacy settings are set to only show their profile to users in the same geographical location.
Prevention involves gaining or developing information related to threats of crime or terrorism and using it to apprehend offenders, harden targets, and use strategies that will eliminate or mitigate the threats.
You are simply awesome and 100k forward to this phenomenal training and certification program!
In Rosenberg v. Collins, the court held that if the computer output is used in the regular course of business, the evidence shall be admitted.
Every state has the same laws and procedures that pertain to the investigation and prosecution of computer crimes.
One of the most important weapons in a cybercrime investigator’s arsenal is a letter requesting that the ISP preserve the data.
Which of the following is a common OSINT tool used for gathering domain information?
Information may be defined as "pieces of raw, unanalyzed data that identify persons, organizations, evidence, events, or illustrate processes that indicate the incidence of a criminal event or witness or evidence of a criminal event."
What is the general modus operandi for thieves selling & transporting stolen goods?
Direct evidence is written testimony, where the knowledge is obtained from any of the witness’s five senses.
Hearsay is second-hand evidence—evidence that is not gathered from the personal knowledge of the witness but from another source.
State and local law enforcement have held the primary responsibility for investigating and prosecuting organized retail crime.
A forensic examiner should always turn off a mobile device at the time of seizure and before starting an acquisition.
Non-delivery of goods is when a seller doesn’t receive money for a product ordered by a buyer.
What is the amount of losses retailers lose to Organized Retail Crime (ORC) each year according to the National Retail Federation?
Just like a hostname can be changed, a MAC address can also be changed through a process called MAC Spoofing.
Which of the following is a well-known search engine used for OSINT investigations?
If an investigator can positively identify an online identity as belonging to a specific suspect, the investigator might also be able to develop further leads about co-conspirators based on other identities contained in their friend's network.
Federal law enforcement can only gather proprietary information concerning an incident in the following ways:
Physical evidence includes things like computers, tools, hardware, or perishable evidence capable of reproduction.
War dialers are tools used to automatically scan phone numbers in search of unsecured modems and fax machines.
