Podcast
Questions and Answers
Which of the following is not a question asked in the text?
Which of the following is not a question asked in the text?
What information is the victim asked to provide about their social media account?
What information is the victim asked to provide about their social media account?
When was the victim unable to access their social media account?
When was the victim unable to access their social media account?
What action did the victim take after the unauthorized access to their social media account?
What action did the victim take after the unauthorized access to their social media account?
Signup and view all the answers
What data was potentially affected by the unauthorized access?
What data was potentially affected by the unauthorized access?
Signup and view all the answers
Did the victim have a copy of the forensic examiner's report?
Did the victim have a copy of the forensic examiner's report?
Signup and view all the answers
Which one of these is NOT a type of wireless connection?
Which one of these is NOT a type of wireless connection?
Signup and view all the answers
Which one of these is a program used to access the internet?
Which one of these is a program used to access the internet?
Signup and view all the answers
Which one of these is NOT a popular web browser?
Which one of these is NOT a popular web browser?
Signup and view all the answers
Which one of these is a website that allows users to be part of a virtual community?
Which one of these is a website that allows users to be part of a virtual community?
Signup and view all the answers
Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?
Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?
Signup and view all the answers
Which one of these is NOT a type of computer-related crime?
Which one of these is NOT a type of computer-related crime?
Signup and view all the answers
Which crime involves an outside source controlling a computer without the owner's permission or knowledge?
Which crime involves an outside source controlling a computer without the owner's permission or knowledge?
Signup and view all the answers
Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?
Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?
Signup and view all the answers
Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
Signup and view all the answers
Which crime involves knowingly and without consent impersonating another person through electronic means for harmful purposes?
Which crime involves knowingly and without consent impersonating another person through electronic means for harmful purposes?
Signup and view all the answers
Which crime involves using an electronic communication device to address obscene language or threats to another person?
Which crime involves using an electronic communication device to address obscene language or threats to another person?
Signup and view all the answers
Which crime involves electronically distributing personal identifying information about another person to incite unlawful action?
Which crime involves electronically distributing personal identifying information about another person to incite unlawful action?
Signup and view all the answers
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
According to the text, which division has the primary investigative responsibility for unauthorized computer accesses?
According to the text, which division has the primary investigative responsibility for unauthorized computer accesses?
Signup and view all the answers
According to the text, who will review the directive and determine whether an audit or inspection will be conducted?
According to the text, who will review the directive and determine whether an audit or inspection will be conducted?
Signup and view all the answers
According to the text, what is the subject of the administrative order?
According to the text, what is the subject of the administrative order?
Signup and view all the answers
According to the text, what is the activation status of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, what is the activation status of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
According to the text, which law enforcement agency would handle a cybercrime that occurred to a victim's home in Los Angeles?
According to the text, which law enforcement agency would handle a cybercrime that occurred to a victim's home in Los Angeles?
Signup and view all the answers
What is the purpose of the Internet Crime Complaint Center (IC3)?
What is the purpose of the Internet Crime Complaint Center (IC3)?
Signup and view all the answers
What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?
What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?
Signup and view all the answers
What is the purpose of a preservation letter in a computer-related crime investigation?
What is the purpose of a preservation letter in a computer-related crime investigation?
Signup and view all the answers
What is the maximum validity period of a preservation letter in a computer-related crime investigation?
What is the maximum validity period of a preservation letter in a computer-related crime investigation?
Signup and view all the answers
What is the purpose of an Internet Protocol (IP) address?
What is the purpose of an Internet Protocol (IP) address?
Signup and view all the answers
Which one of these is a type of internet connection that does not require a cable or wire?
Which one of these is a type of internet connection that does not require a cable or wire?
Signup and view all the answers
What is the purpose of a phishing attack?
What is the purpose of a phishing attack?
Signup and view all the answers
Which one of these is a program that allows users to search for information on the internet?
Which one of these is a program that allows users to search for information on the internet?
Signup and view all the answers
What is the purpose of a preservation letter in a computer-related crime investigation?
What is the purpose of a preservation letter in a computer-related crime investigation?
Signup and view all the answers
Which one of these is a type of fraudulent email in which the sender's email address and other parts of the email header are altered?
Which one of these is a type of fraudulent email in which the sender's email address and other parts of the email header are altered?
Signup and view all the answers
What is the purpose of an Internet Protocol (IP) address?
What is the purpose of an Internet Protocol (IP) address?
Signup and view all the answers
Which law enforcement agency would handle a cybercrime that occurred to a victim's home in Los Angeles?
Which law enforcement agency would handle a cybercrime that occurred to a victim's home in Los Angeles?
Signup and view all the answers
What is the purpose of the Internet Crime Complaint Center (IC3)?
What is the purpose of the Internet Crime Complaint Center (IC3)?
Signup and view all the answers
What is the maximum validity period of a preservation letter in a computer-related crime investigation?
What is the maximum validity period of a preservation letter in a computer-related crime investigation?
Signup and view all the answers
Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?
Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?
Signup and view all the answers
Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
Signup and view all the answers
Which crime involves an outside source controlling a computer without the owner's permission or knowledge?
Which crime involves an outside source controlling a computer without the owner's permission or knowledge?
Signup and view all the answers
Which one of these is NOT a question asked in the text?
Which one of these is NOT a question asked in the text?
Signup and view all the answers
What is the maximum validity period of a preservation letter in a computer-related crime investigation?
What is the maximum validity period of a preservation letter in a computer-related crime investigation?
Signup and view all the answers
Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
Signup and view all the answers
What data was potentially affected by the unauthorized access?
What data was potentially affected by the unauthorized access?
Signup and view all the answers
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?
What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?
Signup and view all the answers
Which crime involves the impersonation of another person through electronic means for harmful purposes?
Which crime involves the impersonation of another person through electronic means for harmful purposes?
Signup and view all the answers
Which crime involves an outside source controlling a computer without the owner's permission or knowledge?
Which crime involves an outside source controlling a computer without the owner's permission or knowledge?
Signup and view all the answers
Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?
Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?
Signup and view all the answers
Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?
Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?
Signup and view all the answers
Which one of these is NOT a popular web browser?
Which one of these is NOT a popular web browser?
Signup and view all the answers
What crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
What crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?
Signup and view all the answers
Which division has the primary investigative responsibility for unauthorized computer accesses?
Which division has the primary investigative responsibility for unauthorized computer accesses?
Signup and view all the answers
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?
Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?
Signup and view all the answers
Which crime involves using an electronic communication device to address obscene language or threats to another person?
Which crime involves using an electronic communication device to address obscene language or threats to another person?
Signup and view all the answers
What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?
What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?
Signup and view all the answers