Pre-Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

The intent of this training & certification program is to provide a perspective and guidance for the development and delivery of cyber intelligence training for law enforcement and fraud professionals.

A.

True

B.

False

Full Access
Question # 5

You can often pull metadata from images on social media sites.

A.

True

B.

False

Full Access
Question # 6

What is shill bidding?

A.

Buying an item online

B.

Going out to eat with a friend

C.

Increasing the bid on an item with another account so that you can drive the price up

Full Access
Question # 7

The Best Evidence Rule was established to deter any alteration of evidence, either intentionally or unintentionally.

A.

True

B.

False

Full Access
Question # 8

The larger the standard deviation between two-like items a seller has sold, the more likely it is to be stolen.

A.

True

B.

False

Full Access
Question # 9

What are the top steps that will help you document an incident and assist federal, state, and local law enforcement agencies in their investigation?

A.

Preserve the state of the computer at the time of the incident by making a backup copy of logs

B.

If the incident is in progress, activate auditing software and consider implementing a keystroke monitoring system

C.

Document the losses suffered by your organization as a result of the incident

D.

Contact law enforcement

E.

All of the above

Full Access
Question # 10

Hearsay is second-hand evidence – which means it is not gathered from the personal knowledge of the witness but from other sources.

A.

True

B.

False

Full Access
Question # 11

All social media websites have strict privacy settings to protect their users.

A.

True

B.

False

Full Access
Question # 12

What is the best way to record information on a social network?

A.

Print screen shots

B.

Screen recording software

C.

Video camera

Full Access
Question # 13

What is the most commonly used email domain for fraud?

A.

Yahoo.com

B.

Gmail.com

C.

Outlook.com

D.

Hotmail.com

Full Access
Question # 14

Are there any laws prohibiting intelligence gathering on social networks?

A.

Some states have restrictions

B.

No laws prevent against it

C.

It is a TOS violation

Full Access
Question # 15

What technique can be used totrack cryptocurrency transactionsin cybercrime investigations?

A.

Blockchain analysis

B.

Reverse IP lookup

C.

Dark web forums

D.

Phishing attacks

Full Access
Question # 16

When evidence of a threat is identified, the Intelligence Process must assess where the threat lies on a multivariate continuum of probability.

A.

True

B.

False

Full Access
Question # 17

NSI may be defined as "the collection and analysis of information concerned with the relationship and homeostasis of the United States with foreign powers, organizations, and persons with regard to political and economic factors as well as the maintenance of the United States' sovereign principles."

A.

True

B.

False

Full Access
Question # 18

Auction fraud patterns typically involve trends and medians in the cost structure.

A.

True

B.

False

Full Access
Question # 19

Information may be defined as "pieces of raw, unanalyzed data that identify persons, organizations, evidence, events, or illustrate processes that indicate the incidence of a criminal event or witness or evidence of a criminal event."

A.

True

B.

False

Full Access
Question # 20

ICE has been taking a heavy stance and prosecuting Organized Retail Crime (ORC).

A.

True

B.

False

Full Access
Question # 21

Within the framework of the discipline, there are three types of intelligence of concern for the present discussion:

(1) Law enforcement (or criminal) intelligence

(2) Homeland Security—also known as

(3) National Security Intelligence.

A.

True

B.

False

Full Access
Question # 22

The most common forms of evidence are direct, real, documentary, and demonstrative.

A.

True

B.

False

Full Access
Question # 23

Just like a hostname can be changed, a MAC address can also be changed through a process called MAC Spoofing.

A.

True

B.

False

Full Access
Question # 24

You do not need a subpoena to request user information from Facebook.

A.

True

B.

False

Full Access
Question # 25

A trojan is a program pretending to be like useful software, while its actual strategy is to access, steal, or destroy user data and access authorization.

A.

True

B.

False

Full Access
Question # 26

Regardless of the type of intelligence, the single function that permeates all activities is the Intelligence Process (also known as the Intelligence Cycle).

A.

True

B.

False

Full Access
Question # 27

A public IP address is assigned to every computer that connects to the Internet where each IP is unique.

A.

True

B.

False

Full Access
Question # 28

State and local law enforcement have held the primary responsibility for investigating and prosecuting organized retail crime.

A.

True

B.

False

Full Access
Question # 29

One of the most important weapons in a cybercrime investigator’s arsenal is a letter requesting that the ISP preserve the data.

A.

True

B.

False

Full Access
Question # 30

A worm is almost similar to a virus, except that it doesn't need the execution of any executable file to get activated.

A.

True

B.

False

Full Access
Question # 31

The Federal Bureau of Investigation (FBI), United States Secret Service (USSS), Immigration and Customs Enforcement (ICE), and United States Postal Inspector (USPI) are all investigating cyber-related crimes.

A.

True

B.

False

Full Access
Question # 32

A UICC does contain volatile and non-volatile memory.

A.

True

B.

False

Full Access
Question # 33

The CCII program and manual should be viewed as a living document and learning environment.

A.

True

B.

False

Full Access
Question # 34

War dialers are tools used to automatically scan phone numbers in search of unsecured modems and fax machines.

A.

True

B.

False

Full Access
Question # 35

The next step is a vulnerability assessment of probable targets.

A.

True

B.

False

Full Access
Question # 36

Please indicate the best method for saving electronic records of the search results:

A.

Screen recording software

B.

Bookmark

C.

Save webpage

Full Access
Question # 37

The chain of evidence shows:

A.

Who obtained the evidence

B.

Who secured the evidence

C.

Who had control or possession of the evidence

D.

All of the above

Full Access
Question # 38

The preservation letter does not legally require the ISP to turn over its records.

A.

True

B.

False

Full Access
Question # 39

How many social networks does an average person have?

A.

2.5

B.

4

C.

1

D.

3

E.

5

Full Access