Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which technique is used for profiling individuals during an investigation?

A.

Social Media Analysis

B.

IP Tracking

C.

Facial Recognition

D.

All of the above

Non-delivery of goods is when a seller doesn’t receive money for a product ordered by a buyer.

A.

True

B.

False

The intent of this training & certification program is to provide a perspective and guidance for the development and delivery of cyber intelligence training for law enforcement and fraud professionals.

A.

True

B.

False

What is the best way to record information on a social network?

A.

Print screen shots

B.

Screen recording software

C.

Video camera

What is informal discovery?

A.

Factual research obtained without document requests, interrogatories, subpoenas, or depositions.

B.

Information collected only through legal means.

Auction fraud patterns typically involve trends and medians in the cost structure.

A.

True

B.

False

"Fruit of the Poisonous Tree" relates to when an illegal search has been conducted to collect evidence in violation of the Fourth Amendment.

A.

True

B.

False

The most common types of evidence include:

A.

Direct

B.

Documentary

C.

Demonstrative

D.

All of the above

A virus is a program that attaches itself to a program or file. This allows it to spread across networks and cause damage to software and hardware.

A.

True

B.

False

What is the number one type of online fraud?

A.

Identity Theft

B.

Non-Delivery of Goods

C.

Credit Card Fraud

D.

Auction Fraud