Pass the McAfee McAfee Institute CCII Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

The first broad class is the "application of intelligence," which deals with knowledge related to a specific crime. Intelligence analysis that produces information about new methods and indicators in the uses of improvised explosive devices (IED) by jihadists, for example, is the "application of intelligence."

Options:

A.

True


B.

False


Expert Solution
Questions # 12:

A UICC does contain volatile and non-volatile memory.

Options:

A.

True


B.

False


Expert Solution
Questions # 13:

Federal law enforcement can only gather proprietary information concerning an incident in the following ways:

Options:

A.

Request for voluntary disclosure of information


B.

Court order


C.

Federal grand jury subpoena


D.

Search warrant


E.

All of the above


Expert Solution
Questions # 14:

The phrase "law enforcement intelligence," used synonymously with "criminal intelligence," refers to law enforcement’s responsibility to enforce the criminal law.

Options:

A.

True


B.

False


Expert Solution
Questions # 15:

In Rosenberg v. Collins, the court held that if the computer output is used in the regular course of business, the evidence shall be admitted.

Options:

A.

True


B.

False


Expert Solution
Questions # 16:

Investigatorsdo notneed to capture the date and time an IP address was logged, because it will not bring any value to an investigation.

Options:

A.

True


B.

False


Expert Solution
Questions # 17:

What is a proxy server?

Options:

A.

A device that masks your computer IP address to appear you are somewhere else


B.

A household device


C.

A device that hides your information


Expert Solution
Questions # 18:

Which of the following is a commonOSINT toolused for gathering domain information?

Options:

A.

WHOIS Lookup


B.

Virtual Private Networks (VPNs)


C.

Dark web marketplaces


D.

Google Translate


Expert Solution
Questions # 19:

A public IP address is assigned to every computer that connects to the Internet where each IP is unique.

Options:

A.

True


B.

False


Expert Solution
Questions # 20:

A forensic examiner should always turn off a mobile device at the time of seizure and before starting an acquisition.

Options:

A.

True


B.

False


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions