New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

McAfee CCII - Certified Cyber Intelligence Investigator (CCII)

Page: 2 / 4
Total 130 questions

What are the top steps that will help you document an incident and assist federal, state, and local law enforcement agencies in their investigation?

A.

Preserve the state of the computer at the time of the incident by making a backup copy of logs

B.

If the incident is in progress, activate auditing software and consider implementing a keystroke monitoring system

C.

Document the losses suffered by your organization as a result of the incident

D.

Contact law enforcement

E.

All of the above

What is non-delivery of goods?

A.

When an item is stolen from the customer’s doorstep

B.

When items are ordered with stolen credit cards

C.

When merchandise ordered is not received

Non-delivery of goods is when a seller doesn’t receive money for a product ordered by a buyer.

A.

True

B.

False

Physical evidence includes things like computers, tools, hardware, or perishable evidence capable of reproduction.

A.

True

B.

False

Information may be defined as "pieces of raw, unanalyzed data that identify persons, organizations, evidence, events, or illustrate processes that indicate the incidence of a criminal event or witness or evidence of a criminal event."

A.

True

B.

False

Intelligence is the beginning product of an analytical process that evaluates information collected from diverse sources.

A.

True

B.

False

War dialers are tools used to automatically scan phone numbers in search of unsecured modems and fax machines.

A.

True

B.

False

Facebook does not release user information to law enforcement.

A.

True

B.

False

Prevention involves gaining or developing information related to threats of crime or terrorism and using it to apprehend offenders, harden targets, and use strategies that will eliminate or mitigate the threats.

A.

True

B.

False

Hostnames are the system names assigned by a computer by the system, user, or owner.

A.

True

B.

False