California Cyberbullying Laws Quiz
60 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is not a question asked in the text?

  • Does the victim have any server logs? (correct)
  • If the company has an "Information Technology (IT)" person, what is that person's contact information?
  • What social media accounts were targeted?
  • Did the victim report the unauthorized access to the social media site?
  • What information is the victim asked to provide about their social media account?

  • The victim's email address
  • The victim's phone number
  • The victim's password
  • The victim's account log on ID (correct)
  • When was the victim unable to access their social media account?

  • After the unauthorized access (correct)
  • Before the unauthorized access
  • During the unauthorized access
  • The text does not specify
  • What action did the victim take after the unauthorized access to their social media account?

    <p>Reported the unauthorized access to the social media site</p> Signup and view all the answers

    What data was potentially affected by the unauthorized access?

    <p>All of the above</p> Signup and view all the answers

    Did the victim have a copy of the forensic examiner's report?

    <p>The text does not specify</p> Signup and view all the answers

    Which one of these is NOT a type of wireless connection?

    <p>Ethernet</p> Signup and view all the answers

    Which one of these is a program used to access the internet?

    <p>Safari</p> Signup and view all the answers

    Which one of these is NOT a popular web browser?

    <p>Yahoo</p> Signup and view all the answers

    Which one of these is a website that allows users to be part of a virtual community?

    <p>Twitter</p> Signup and view all the answers

    Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?

    <p>Spooling</p> Signup and view all the answers

    Which one of these is NOT a type of computer-related crime?

    <p>Social Network</p> Signup and view all the answers

    Which crime involves an outside source controlling a computer without the owner's permission or knowledge?

    <p>Unauthorized Computer Access</p> Signup and view all the answers

    Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?

    <p>Grand Theft</p> Signup and view all the answers

    Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?

    <p>Cyber Stalking</p> Signup and view all the answers

    Which crime involves knowingly and without consent impersonating another person through electronic means for harmful purposes?

    <p>False Personation</p> Signup and view all the answers

    Which crime involves using an electronic communication device to address obscene language or threats to another person?

    <p>No Threatening Email Act</p> Signup and view all the answers

    Which crime involves electronically distributing personal identifying information about another person to incite unlawful action?

    <p>Harassing Electronic Communication</p> Signup and view all the answers

    According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

    <p>To assist officers in identifying computer-related crimes and terminology.</p> Signup and view all the answers

    According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

    <p>In LAPD E-Forms on the Department's Local Area Network (LAN).</p> Signup and view all the answers

    According to the text, which division has the primary investigative responsibility for unauthorized computer accesses?

    <p>Computer Crimes Unit (CCU), Commercial Crimes Division (CCD).</p> Signup and view all the answers

    According to the text, who will review the directive and determine whether an audit or inspection will be conducted?

    <p>Commanding Officer, Internal Audits and Inspections Division.</p> Signup and view all the answers

    According to the text, what is the subject of the administrative order?

    <p>Computer-Related Crimes - Field Notebook Divider.</p> Signup and view all the answers

    According to the text, what is the activation status of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

    <p>Activated.</p> Signup and view all the answers

    According to the text, which law enforcement agency would handle a cybercrime that occurred to a victim's home in Los Angeles?

    <p>Los Angeles Police Department (LAPD)</p> Signup and view all the answers

    What is the purpose of the Internet Crime Complaint Center (IC3)?

    <p>All of the above</p> Signup and view all the answers

    What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?

    <p>Refer the victim to IC3</p> Signup and view all the answers

    What is the purpose of a preservation letter in a computer-related crime investigation?

    <p>To preserve evidence before it expires or is deleted</p> Signup and view all the answers

    What is the maximum validity period of a preservation letter in a computer-related crime investigation?

    <p>90 days</p> Signup and view all the answers

    What is the purpose of an Internet Protocol (IP) address?

    <p>To identify a particular computer on the internet</p> Signup and view all the answers

    Which one of these is a type of internet connection that does not require a cable or wire?

    <p>Wi-Fi</p> Signup and view all the answers

    What is the purpose of a phishing attack?

    <p>To fraudulently obtain confidential information</p> Signup and view all the answers

    Which one of these is a program that allows users to search for information on the internet?

    <p>Google</p> Signup and view all the answers

    What is the purpose of a preservation letter in a computer-related crime investigation?

    <p>To request the preservation of electronic evidence</p> Signup and view all the answers

    Which one of these is a type of fraudulent email in which the sender's email address and other parts of the email header are altered?

    <p>Spoofing</p> Signup and view all the answers

    What is the purpose of an Internet Protocol (IP) address?

    <p>To identify devices on a network</p> Signup and view all the answers

    Which law enforcement agency would handle a cybercrime that occurred to a victim's home in Los Angeles?

    <p>Los Angeles Police Department</p> Signup and view all the answers

    What is the purpose of the Internet Crime Complaint Center (IC3)?

    <p>All of the above</p> Signup and view all the answers

    What is the maximum validity period of a preservation letter in a computer-related crime investigation?

    <p>90 days</p> Signup and view all the answers

    Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?

    <p>Auction Fraud</p> Signup and view all the answers

    Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?

    <p>Cyberstalking</p> Signup and view all the answers

    Which crime involves an outside source controlling a computer without the owner's permission or knowledge?

    <p>Hacking</p> Signup and view all the answers

    Which one of these is NOT a question asked in the text?

    <p>What is the purpose of the Internet Crime Complaint Center (IC3)?</p> Signup and view all the answers

    What is the maximum validity period of a preservation letter in a computer-related crime investigation?

    <p>90 days</p> Signup and view all the answers

    Which crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?

    <p>Cyberstalking</p> Signup and view all the answers

    What data was potentially affected by the unauthorized access?

    <p>Social media account passwords</p> Signup and view all the answers

    According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

    <p>In the administrative order</p> Signup and view all the answers

    What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?

    <p>Advise the victim to report it to the Internet Crime Complaint Center (IC3)</p> Signup and view all the answers

    Which crime involves the impersonation of another person through electronic means for harmful purposes?

    <p>False Personation</p> Signup and view all the answers

    Which crime involves an outside source controlling a computer without the owner's permission or knowledge?

    <p>Unauthorized Computer Access</p> Signup and view all the answers

    Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?

    <p>Spoofing</p> Signup and view all the answers

    Which crime involves tricking a victim into buying/selling/shipping goods, money, or services through a spoofed email?

    <p>Grand Theft and Petty Theft</p> Signup and view all the answers

    Which one of these is NOT a popular web browser?

    <p>Python</p> Signup and view all the answers

    What crime involves making a credible threat with the intent to place a person in reasonable fear for their safety through electronic communication?

    <p>Cyber Stalking</p> Signup and view all the answers

    Which division has the primary investigative responsibility for unauthorized computer accesses?

    <p>Computer Crimes Unit</p> Signup and view all the answers

    What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

    <p>To assist officers in identifying computer-related crimes and terminology</p> Signup and view all the answers

    Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

    <p>In LAPD E-Forms on the Department's Local Area Network (LAN)</p> Signup and view all the answers

    Which one of these is a type of fraudulent email where the sender's email address and other parts of the email header are altered?

    <p>Spoofing email</p> Signup and view all the answers

    Which crime involves using an electronic communication device to address obscene language or threats to another person?

    <p>Cyberbullying</p> Signup and view all the answers

    What action should be taken by law enforcement if a victim reports observing a scam or hoax on the internet but is not a direct victim?

    <p>Refer the victim to the Internet Crime Complaint Center (IC3)</p> Signup and view all the answers

    More Like This

    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws
    54 questions
    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws Quiz
    50 questions
    Use Quizgecko on...
    Browser
    Browser