Online Computer Investigations
15 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What types of Internet crimes are specifically addressed by the Investigative Services Bureau?

  • Online harassment and cyberbullying
  • Phishing and malware distribution
  • Exploitation of minors, fraud, threats, and dissemination of child pornography (correct)
  • Identity theft and hacking
  • What is the requirement for detectives involved in online investigations regarding their online accounts?

  • They should use online accounts with their real identities
  • They must use online accounts with undercover identities registered and paid for with department funds (correct)
  • They can use personal online accounts if necessary
  • They need to create new online accounts for each investigation
  • What should detectives avoid when performing online investigations?

  • Engaging with suspects online
  • Using personal online accounts for investigations (correct)
  • Using sterile computers designated by the Department
  • Disclosing their undercover identity to colleagues
  • What type of computers must be used for online investigations?

    <p>Computers designated by the Department and set up as sterile computers</p> Signup and view all the answers

    In what manner should detectives maintain their identity while involved in online investigations?

    <p>Maintain an undercover identity in accordance with departmental procedures</p> Signup and view all the answers

    What is the purpose of using sterilized media in the online investigation?

    <p>To prevent contamination of the retrieved information</p> Signup and view all the answers

    Why is it imperative to release information only on a need-to-know basis?

    <p>To protect the security of employees involved, especially undercover law enforcement officers</p> Signup and view all the answers

    Who is allowed to conduct online investigations, according to the text?

    <p>Department detectives who have received instruction in conducting online investigations</p> Signup and view all the answers

    Under what circumstances can employees utilize fictitious accounts for online activities?

    <p>For department-related activities with supervisor approval</p> Signup and view all the answers

    What is the purpose of using fictitious accounts in online investigations?

    <p>To obtain criminal intelligence information</p> Signup and view all the answers

    Why should employees never attempt to communicate with individuals using fictitious accounts without supervisory approval?

    <p>To protect their own identity</p> Signup and view all the answers

    What is the main reason for time and date stamping and saving all online chat logs during an investigation?

    <p>To maintain an accurate record for forensic analysis</p> Signup and view all the answers

    Why is it important for employees to log into authorized fictitious accounts only from department-issued devices and Internet connections?

    <p>To prevent unauthorized access to sensitive information</p> Signup and view all the answers

    What is the purpose of utilizing sterilized media to store information retrieved from a computer’s hard drive?

    <p>To maintain the integrity of the retrieved information for forensic analysis</p> Signup and view all the answers

    Why should online investigations be conducted in a secure location?

    <p>To protect sensitive information from public viewing</p> Signup and view all the answers

    More Like This

    Computer Science Online Courses
    10 questions
    Computer Security and Online Safety
    6 questions
    Computer Ethics and Online Safety Quiz
    37 questions
    Use Quizgecko on...
    Browser
    Browser