California Cyberbullying Laws Quiz
50 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following best defines phishing?

  • Posing as a legitimate business on social media
  • Requesting confidential information over the internet under false pretenses (correct)
  • Searching for information on the internet
  • Accessing the internet without a cable or wire
  • What is a search engine?

  • A globally connected network
  • A website that allows users to be part of a virtual community
  • A program that allows the user to search for information on the internet (correct)
  • A program used to access the internet
  • What is the purpose of a web browser?

  • To be part of a virtual community
  • To search for information on the internet
  • To connect a device to the internet access point
  • To access the internet (correct)
  • What is spooling?

    <p>Fraudulent emails in which the sender's email address and other parts of the email header are altered</p> Signup and view all the answers

    What is a wireless connection?

    <p>An internet connection without a cable or wire</p> Signup and view all the answers

    What is the purpose of a secure internet access?

    <p>To connect a device to the internet access point with a password</p> Signup and view all the answers

    Which division in the LAPD has primary investigative responsibility for unauthorized computer accesses?

    <p>Computer Crimes Unit</p> Signup and view all the answers

    What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

    <p>To assist officers in identifying computer-related crimes and terminology</p> Signup and view all the answers

    Who will review the directive and determine whether an audit or inspection will be conducted?

    <p>Internal Audits and Inspections Division</p> Signup and view all the answers

    Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

    <p>In LAPD E-Forms on the Department's Local Area Network (LAN)</p> Signup and view all the answers

    What is the activation status of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

    <p>Activated and currently in use</p> Signup and view all the answers

    What is the subject of Administrative Order No. 4?

    <p>Computer-Related Crimes - Field Notebook Divider</p> Signup and view all the answers

    Which of the following is a question that can be answered based on the given text?

    <p>What social media accounts were targeted?</p> Signup and view all the answers

    Which of the following is NOT a question that can be answered based on the given text?

    <p>If the company has an 'Information Technology (IT)' person, what is that person's contact information?</p> Signup and view all the answers

    Which of the following is a question that can be answered based on the given text?

    <p>What data was deleted, copied or altered?</p> Signup and view all the answers

    Which of the following is NOT a question that can be answered based on the given text?

    <p>When did the victim last access the social media account?</p> Signup and view all the answers

    Which of the following is a question that can be answered based on the given text?

    <p>What social media accounts were targeted?</p> Signup and view all the answers

    Which of the following is NOT a question that can be answered based on the given text?

    <p>Does the victim have any server logs?</p> Signup and view all the answers

    Which organization operates the Internet Crime Complaint Center (IC3)?

    <p>Federal Bureau of Investigation (FBI)</p> Signup and view all the answers

    What action should be taken if a victim observes a scam or hoax on the internet but is not a direct victim of that hoax or scam?

    <p>Refer the victim to the IC3</p> Signup and view all the answers

    What is the purpose of a preservation letter in a computer-related crime investigation?

    <p>To capture any subscriber information, data usage, etc., before it expires or is deleted</p> Signup and view all the answers

    What is the definition of a denial of service (DOS) attack?

    <p>Taking over a website using a program installed on the computer</p> Signup and view all the answers

    What is the purpose of an Internet Protocol (IP) address?

    <p>To identify a particular computer on the internet</p> Signup and view all the answers

    Which organization provides access to the internet?

    <p>Internet Service Provider (ISP)</p> Signup and view all the answers

    Which section of the California Penal Code addresses crimes related to unauthorized computer access, commonly referred to as 'hacking'?

    <p>Section 502(c)</p> Signup and view all the answers

    Which type of crime involves the suspect tricking the victim into buying, selling, or shipping goods, money, or services through spoofed emails?

    <p>Grand Theft</p> Signup and view all the answers

    Which crime involves the willful and malicious following or harassment of another person, including threats made through electronic communication?

    <p>Cyber Stalking</p> Signup and view all the answers

    Which type of crime involves the impersonation of another actual person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?

    <p>False Personation</p> Signup and view all the answers

    Which crime involves the use of an electronic communication device to address obscene language or threats to another person's safety or property?

    <p>Criminal Threats</p> Signup and view all the answers

    Which crime involves the electronic distribution or publication of personal identifying information about another person, with the intent to place that person in reasonable fear for their safety?

    <p>Harassing Electronic Communication</p> Signup and view all the answers

    What is the new limit for the Compensatory Time Off (CTO) bank for sworn employees?

    <p>800 hours</p> Signup and view all the answers

    What is the purpose of the new Memorandum of Understanding (MOU)?

    <p>To address the budget deficit</p> Signup and view all the answers

    Who ratified the new Memorandum of Understanding (MOU)?

    <p>All of the above</p> Signup and view all the answers

    What happens when a sworn employee's CTO bank exceeds 600 hours?

    <p>They are required to take mandatory time off</p> Signup and view all the answers

    Who is responsible for managing the overtime of sworn personnel?

    <p>Commanding officers (C/Os)</p> Signup and view all the answers

    What is the purpose of actively monitoring overtime balances and reducing balances over 600 hours?

    <p>To ensure operational needs are met</p> Signup and view all the answers

    Are special grants and reimbursable overtime activities included in the 800-hour CTO bank?

    <p>No</p> Signup and view all the answers

    What is the purpose of the Administrative Order No. 7?

    <p>To address the budget deficit</p> Signup and view all the answers

    What is the responsibility of sworn personnel in managing overtime?

    <p>To work with their C/Os to maintain a CTO bank at or below 600 hours</p> Signup and view all the answers

    What is the purpose of the increased Compensatory Time Off (CTO) bank limit?

    <p>To address the budget deficit</p> Signup and view all the answers

    According to Administrative Order No. 7, what action should be taken if a sworn employee's CTO bank exceeds 600 hours?

    <p>The employee should be given mandatory time off</p> Signup and view all the answers

    Who should be contacted for questions regarding Administrative Order No. 7?

    <p>The Employee Relations Administrator</p> Signup and view all the answers

    How often are C/Os provided with Sworn Overtime Monitoring Reports?

    <p>Bi-weekly</p> Signup and view all the answers

    What is the purpose of providing C/Os with Sworn Overtime Monitoring Reports?

    <p>To monitor overtime balances</p> Signup and view all the answers

    How much notice should be given to an employee before they are required to use CTO time?

    <p>24 hours</p> Signup and view all the answers

    What should the Department consider when directing an employee to take mandatory time off?

    <p>The employee's deployment needs</p> Signup and view all the answers

    What can the Department schedule in lieu of or in conjunction with vacation time for an employee with excess CTO hours?

    <p>Mandatory time off</p> Signup and view all the answers

    What is the threshold for identifying a sworn employee with excessive CTO hours?

    <p>600 hours</p> Signup and view all the answers

    Who is responsible for monitoring sworn employees' overtime balances?

    <p>The Commanding Officer</p> Signup and view all the answers

    What type of reports can divisional timekeepers print regarding employees' balances?

    <p>Sworn Overtime Monitoring Reports</p> Signup and view all the answers

    More Like This

    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws
    54 questions
    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws Quiz
    60 questions
    Use Quizgecko on...
    Browser
    Browser