Special Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CCII Questions and Answers

Question # 6

Tactical intelligence is considered actionable intelligence about imminent or near-term threats that is disseminated to the line functions of law enforcement.

A.

True

B.

False

Full Access
Question # 7

What is shill bidding?

A.

Buying an item online

B.

Going out to eat with a friend

C.

Increasing the bid on an item with another account so that you can drive the price up

Full Access
Question # 8

Fraudsters often engage in bursty trading patterns, where they conduct multiple fraudulent transactions in a short period before disappearing.

A.

True

B.

False

Full Access
Question # 9

Information may be defined as "pieces of raw, unanalyzed data that identify persons, organizations, evidence, events, or illustrate processes that indicate the incidence of a criminal event or witness or evidence of a criminal event."

A.

True

B.

False

Full Access
Question # 10

Program developers are urged to explore the diverse application of law enforcement intelligence where training voids exist and adopt the same philosophy and curricular issues described within this certification program.

A.

True

B.

False

Full Access
Question # 11

What is a privacy policy?

A.

A policy no one reads

B.

A policy that helps to establish how your personal information is handled

Full Access
Question # 12

Every state has the same laws and procedures that pertain to the investigation and prosecution of computer crimes.

A.

True

B.

False

Full Access
Question # 13

What is the number one type of online fraud?

A.

Identity Theft

B.

Non-Delivery of Goods

C.

Credit Card Fraud

D.

Auction Fraud

Full Access
Question # 14

Are there any laws prohibiting intelligence gathering on social networks?

A.

Some states have restrictions

B.

No laws prevent against it

C.

It is a TOS violation

Full Access
Question # 15

Fraudsters never manipulate feedback on auction sites.

A.

True

B.

False

Full Access
Question # 16

Those forced to travel and steal did so because they were too well known locally, but they normally returned to their local area in order to sell.

A.

True

B.

False

Full Access
Question # 17

Which one of the following methods best reflects how thieves stash their stolen goods?

A.

At McDonald's in the bathroom

B.

Back alleys were used to stash and to transport stolen goods by thieves on foot

C.

Stolen goods are never dumped or stashed

Full Access
Question # 18

Before evidence can be presented in court, it must be competent, relevant, and material to the issue and must be presented in compliance with the rules of evidence.

A.

True

B.

False

Full Access
Question # 19

Computer-generated evidence is never suspect, because of the ease with which it can be altered, usually without a trace.

A.

True

B.

False

Full Access
Question # 20

The phrase "law enforcement intelligence," used synonymously with "criminal intelligence," refers to law enforcement's responsibility to enforce the criminal law.

A.

True

B.

False

Full Access
Question # 21

Direct evidence is written testimony, where the knowledge is obtained from any of the witness’s five senses.

A.

True

B.

False

Full Access
Question # 22

The most common types of evidence include:

A.

Direct

B.

Documentary

C.

Demonstrative

D.

All of the above

Full Access
Question # 23

Intelligence is the beginning product of an analytical process that evaluates information collected from diverse sources.

A.

True

B.

False

Full Access
Question # 24

Homeland Security is prosecuting international cases of human trafficking.

A.

True

B.

False

Full Access
Question # 25

A forensic investigator must follow the chain of custody when handling digital evidence.

A.

True

B.

False

Full Access
Question # 26

War dialers are tools used to automatically scan phone numbers in search of unsecured modems and fax machines.

A.

True

B.

False

Full Access
Question # 27

Shoplifters who used drugs and traveled by train often bought tickets.

A.

True

B.

False

Full Access
Question # 28

Please indicate the best method for saving electronic records of the search results:

A.

Screen recording software

B.

Bookmark

C.

Save webpage

Full Access
Question # 29

CDMA stands for:

A.

Code Division Major Access

B.

Code Division Multiple Access

C.

Code Division Municipal Access

D.

Code Division Mobile Access

Full Access
Question # 30

"Fruit of the Poisonous Tree" relates to when an illegal search has been conducted to collect evidence in violation of the Fourth Amendment.

A.

True

B.

False

Full Access
Question # 31

The United States Secret Service (USSS) is responsible for financial crimes around the United States.

A.

True

B.

False

Full Access
Question # 32

Planning and resource allocation provides information to decision-makers about the changing nature of threats.

A.

True

B.

False

Full Access
Question # 33

If you have no luck identifying a subject on a social network, try adjusting your regional settings and change your location. Sometimes, the user's privacy settings are set to only show their profile to users in the same geographical location.

A.

True

B.

False

Full Access
Question # 34

The chain of evidence shows:

A.

Who obtained the evidence

B.

Who secured the evidence

C.

Who had control or possession of the evidence

D.

All of the above

Full Access
Question # 35

The first broad class is the "application of intelligence," which deals with knowledge related to a specific crime. Intelligence analysis that produces information about new methods and indicators in the uses of improvised explosive devices (IED) by jihadists, for example, is the "application of intelligence."

A.

True

B.

False

Full Access
Question # 36

Which of the following is the most effective method for verifying a suspect’s online identity?

A.

Checking multiple social media accounts for consistency

B.

Using a single source for confirmation

C.

Relying on unverified third-party information

D.

Assuming identity based on email address alone

Full Access
Question # 37

Computer-generated evidence is always suspect because of the ease with which it can be altered, usually without a trace.

A.

True

B.

False

Full Access
Question # 38

What is the general modus operandi for thieves selling & transporting stolen goods?

A.

Many thieves had around 20-30 people and retail outlets where they felt they could "safely" sell stolen goods.

B.

Fences liked to sell goods out of their houses.

C.

Boosters are the best at selling counterfeit goods.

Full Access
Question # 39

You can often pull metadata from images on social media sites.

A.

True

B.

False

Full Access