New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

McAfee CCII - Certified Cyber Intelligence Investigator (CCII)

Page: 3 / 4
Total 130 questions

Homeland Security is prosecuting international cases of human trafficking.

A.

True

B.

False

Just like a hostname can be changed, a MAC address can also be changed through a process called MAC Spoofing.

A.

True

B.

False

Computer crimes can be separated into two categories:

A.

Crimes facilitated by a computer and crimes where a computer or network is the target

B.

Crimes where an animal was involved and crimes not on the internet

What is the general modus operandi for thieves selling & transporting stolen goods?

A.

Many thieves had around 20-30 people and retail outlets where they felt they could "safely" sell stolen goods.

B.

Fences liked to sell goods out of their houses.

C.

Boosters are the best at selling counterfeit goods.

A virus is a program that attaches itself to a program or file. This allows it to spread across networks and cause damage to software and hardware.

A.

True

B.

False

How is a privacy policy used in social networks?

A.

To protect members' information

B.

To set guidelines on how information will be shared

C.

All of the above

Thieves, in general, are motivated to steal and sell goods because they can quickly convert them for money.

A.

True

B.

False

Electronic evidence can be easily manipulated, making it crucial for investigators to follow strict digital forensic procedures.

A.

True

B.

False

What benefit do fraudsters obtain by manipulating feedback systems?

A.

The ability to sell in shorter durations of time

B.

Established trust

C.

The ability to sell multiple quantities of like items

D.

The ability to use multiple accounts to carry out fraud schemes

E.

All of the above

In Rosenberg v. Collins, the court held that if the computer output is used in the regular course of business, the evidence shall be admitted.

A.

True

B.

False