Podcast
Questions and Answers
Which of the following is not a question asked in the text?
Which of the following is not a question asked in the text?
- Does the victim have any server logs? (correct)
- If the company has an "Information Technology (IT)" person, what is that person's contact information?
- What social media accounts were targeted?
- Did the victim report the unauthorized access to the social media site?
What information is the victim asked to provide about their social media account?
What information is the victim asked to provide about their social media account?
- The victim's email address
- The victim's phone number
- The victim's password
- The victim's account log on ID (correct)
When was the victim unable to access their social media account?
When was the victim unable to access their social media account?
- After the unauthorized access (correct)
- Before the unauthorized access
- During the unauthorized access
- The text does not specify
What action did the victim take after the unauthorized access to their social media account?
What action did the victim take after the unauthorized access to their social media account?
What data was potentially affected by the unauthorized access?
What data was potentially affected by the unauthorized access?
Did the victim have a copy of the forensic examiner's report?
Did the victim have a copy of the forensic examiner's report?
Which one of these is NOT a type of wireless connection?
Which one of these is NOT a type of wireless connection?
Which one of these is a program used to access the internet?
Which one of these is a program used to access the internet?
Which one of these is NOT a popular web browser?
Which one of these is NOT a popular web browser?
Which one of these is a website that allows users to be part of a virtual community?
Which one of these is a website that allows users to be part of a virtual community?
Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?
Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?
Which one of these is NOT a type of computer-related crime?
Which one of these is NOT a type of computer-related crime?
Which crime involves an outside source controlling a computer without the owner's permission or knowledge?
Which crime involves an outside source controlling a computer without the owner's permission or knowledge?
Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?
Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?
Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
Which crime involves knowingly and without consent impersonating another person through electronic means for harmful purposes?
Which crime involves knowingly and without consent impersonating another person through electronic means for harmful purposes?
Which crime involves using an electronic communication device to address obscene language or threats to another person?
Which crime involves using an electronic communication device to address obscene language or threats to another person?
Which crime involves electronically distributing personal identifying information about another person to incite unlawful action?
Which crime involves electronically distributing personal identifying information about another person to incite unlawful action?
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
According to the text, which division has the primary investigative responsibility for unauthorized computer accesses?
According to the text, which division has the primary investigative responsibility for unauthorized computer accesses?
According to the text, who will review the directive and determine whether an audit or inspection will be conducted?
According to the text, who will review the directive and determine whether an audit or inspection will be conducted?
According to the text, what is the subject of the administrative order?
According to the text, what is the subject of the administrative order?
According to the text, what is the activation status of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, what is the activation status of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, which law enforcement agency would handle a cybercrime that occurred to a victim's home in Los Angeles?
According to the text, which law enforcement agency would handle a cybercrime that occurred to a victim's home in Los Angeles?
What is the purpose of the Internet Crime Complaint Center (IC3)?
What is the purpose of the Internet Crime Complaint Center (IC3)?
What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?
What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?
What is the purpose of a preservation letter in a computer-related crime investigation?
What is the purpose of a preservation letter in a computer-related crime investigation?
What is the maximum validity period of a preservation letter in a computer-related crime investigation?
What is the maximum validity period of a preservation letter in a computer-related crime investigation?
What is the purpose of an Internet Protocol (IP) address?
What is the purpose of an Internet Protocol (IP) address?
Which one of these is a type of internet connection that does not require a cable or wire?
Which one of these is a type of internet connection that does not require a cable or wire?
What is the purpose of a phishing attack?
What is the purpose of a phishing attack?
Which one of these is a program that allows users to search for information on the internet?
Which one of these is a program that allows users to search for information on the internet?
What is the purpose of a preservation letter in a computer-related crime investigation?
What is the purpose of a preservation letter in a computer-related crime investigation?
Which one of these is a type of fraudulent email in which the sender's email address and other parts of the email header are altered?
Which one of these is a type of fraudulent email in which the sender's email address and other parts of the email header are altered?
What is the purpose of an Internet Protocol (IP) address?
What is the purpose of an Internet Protocol (IP) address?
Which law enforcement agency would handle a cybercrime that occurred to a victim's home in Los Angeles?
Which law enforcement agency would handle a cybercrime that occurred to a victim's home in Los Angeles?
What is the purpose of the Internet Crime Complaint Center (IC3)?
What is the purpose of the Internet Crime Complaint Center (IC3)?
What is the maximum validity period of a preservation letter in a computer-related crime investigation?
What is the maximum validity period of a preservation letter in a computer-related crime investigation?
Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?
Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?
Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
Which crime involves an outside source controlling a computer without the owner's permission or knowledge?
Which crime involves an outside source controlling a computer without the owner's permission or knowledge?
Which one of these is NOT a question asked in the text?
Which one of these is NOT a question asked in the text?
What is the maximum validity period of a preservation letter in a computer-related crime investigation?
What is the maximum validity period of a preservation letter in a computer-related crime investigation?
Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
What data was potentially affected by the unauthorized access?
What data was potentially affected by the unauthorized access?
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?
What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?
Which crime involves the impersonation of another person through electronic means for harmful purposes?
Which crime involves the impersonation of another person through electronic means for harmful purposes?
Which crime involves an outside source controlling a computer without the owner's permission or knowledge?
Which crime involves an outside source controlling a computer without the owner's permission or knowledge?
Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?
Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?
Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?
Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?
Which one of these is NOT a popular web browser?
Which one of these is NOT a popular web browser?
What crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
What crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
Which division has the primary investigative responsibility for unauthorized computer accesses?
Which division has the primary investigative responsibility for unauthorized computer accesses?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?
Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?
Which crime involves using an electronic communication device to address obscene language or threats to another person?
Which crime involves using an electronic communication device to address obscene language or threats to another person?
What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?
What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?