Which of the following are two (2) Cyber intelligence sweet spots?
A. Impact analysis; Detection
B. Attack tree development; Prevention
C. Impact: Actor/team analysis
D. Detection: Attack tree development
Which of the following best describes the benefits Miami-Dade Police Department experience using i2 ILE?
A. Following a lengthy installation / integration project. MDPD now have a single solution to access all data stores, internal and external, reducing the number of investigative staff required.
B. A single solution from the officer on the street to command staff supports tactical lead generation through access to historical records, assisting in generating links, associations and reports.
C. A single solution from the officer on the street to command staff supports strategic planning and resource deployment, with a single point to search all data stores allowing fast lead generation and case resolution.
D. A and C
Cyber intelligence helps to investigate primarily on-going cyber-attacks.
A. True
B. False
i2 customers come from many different industries. Which of the following are potential concerns for i2 prospects?
A. CyberCrime
B. Anti Money Laundering
C. Counterfeit
D. All of the above
Who are the target users for the Field Edition?
A. Analysts
B. Power users
C. Commanders
D. Forward deployed field operators, Collection teams and Plans/Operations
ILE Standard is aimed at:
A. Detectives. Command Staff. Patrol Officers
B. Parole Officers
C. Analysts and investigators
D. Command staff only
Analysts, who use the system on a critical basis day to day for crime and intelligence information production, would use:
A. ILE Premium
B. ILE Standard
Multiple visualization options facilitate deeper insight to information. Visualizations available in Analyst's Notebook include:
A. Timeline, link analysis and social network analysis
B. Dashboard and bar chart
C. Scatter plot, link analysis and data flow diagram
D. Histogram, tree map and table