Podcast
Questions and Answers
Which social media account(s) were targeted in the incident?
Which social media account(s) were targeted in the incident?
- Facebook (correct)
When was the victim last able to access their social media account?
When was the victim last able to access their social media account?
- Unknown
- After the unauthorized access
- Before the unauthorized access (correct)
- During the unauthorized access
Did the victim report the unauthorized access to the social media site?
Did the victim report the unauthorized access to the social media site?
- Unknown
- No
- Yes (correct)
- Not mentioned
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Who is responsible for reviewing the directive and determining whether an audit or inspection will be conducted?
Who is responsible for reviewing the directive and determining whether an audit or inspection will be conducted?
Which unit has the primary investigative responsibility for unauthorized computer accesses?
Which unit has the primary investigative responsibility for unauthorized computer accesses?
Which of the following is a program used to access the internet?
Which of the following is a program used to access the internet?
What is the address of a specific website or file on the internet called?
What is the address of a specific website or file on the internet called?
What is the term used to describe fraudulent emails in which the sender's email address and other parts of the email header are altered to appear as though the email originated from a different source?
What is the term used to describe fraudulent emails in which the sender's email address and other parts of the email header are altered to appear as though the email originated from a different source?
What is the term used to describe a program that allows the user to search for information on the internet?
What is the term used to describe a program that allows the user to search for information on the internet?
Which section of the California Penal Code addresses crimes involving unauthorized computer access, commonly referred to as 'hacking'?
Which section of the California Penal Code addresses crimes involving unauthorized computer access, commonly referred to as 'hacking'?
Which crime involves the suspect tricking the victim through email to buy/sell/ship goods, money, or services?
Which crime involves the suspect tricking the victim through email to buy/sell/ship goods, money, or services?
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves electronically distributing personal identifying information about another person, with the intent to place that person in reasonable fear for their safety?
Which crime involves electronically distributing personal identifying information about another person, with the intent to place that person in reasonable fear for their safety?
Which organization operates the Internet Crime Complaint Center (IC3)?
Which organization operates the Internet Crime Complaint Center (IC3)?
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
What is the main difference between a desktop computer and a laptop?
What is the main difference between a desktop computer and a laptop?
What is the definition of hacking?
What is the definition of hacking?
Which division has primary investigative responsibility for unauthorized computer accesses?
Which division has primary investigative responsibility for unauthorized computer accesses?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the distribution code for the Computer-Related Crimes - Field Notebook Divider?
What is the distribution code for the Computer-Related Crimes - Field Notebook Divider?
Which of the following is NOT a question that needs to be answered during a digital forensic investigation?
Which of the following is NOT a question that needs to be answered during a digital forensic investigation?
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which of the following is the most common type of wireless connection?
Which of the following is the most common type of wireless connection?
What is the purpose of a web browser?
What is the purpose of a web browser?
What is the definition of phishing?
What is the definition of phishing?
What is the purpose of a search engine?
What is the purpose of a search engine?
Which crime is commonly referred to as 'hacking'?
Which crime is commonly referred to as 'hacking'?
Which crime involves following or harassing another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Which crime involves following or harassing another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through email?
Which crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through email?
Which of the following is NOT a type of cybercrime mentioned in the text?
Which of the following is NOT a type of cybercrime mentioned in the text?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Which of the following is a correct definition of a Desktop Computer(Tower)?
Which of the following is a correct definition of a Desktop Computer(Tower)?
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
Which of the following crimes is commonly referred to as 'hacking'?
Which of the following crimes is commonly referred to as 'hacking'?
Which crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through email?
Which crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through email?
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves following or harassing another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Which crime involves following or harassing another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Which of the following is NOT a question that should be asked during a cybercrime investigation?
Which of the following is NOT a question that should be asked during a cybercrime investigation?
What type of data might be deleted, copied, or altered during a cybercrime incident?
What type of data might be deleted, copied, or altered during a cybercrime incident?
Which of the following is the purpose of a preservation letter sent to the carrier of an Internet Protocol (IP) address?
Which of the following is the purpose of a preservation letter sent to the carrier of an Internet Protocol (IP) address?
Which unit within the LAPD has the primary responsibility for investigating unauthorized computer accesses?
Which unit within the LAPD has the primary responsibility for investigating unauthorized computer accesses?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Which section of the California Penal Code specifically addresses crimes involving unauthorized computer access, commonly referred to as 'hacking'?
Which section of the California Penal Code specifically addresses crimes involving unauthorized computer access, commonly referred to as 'hacking'?
Which of the following crimes involves taking over a website by installing a program on the victim's computer or through remote access?
Which of the following crimes involves taking over a website by installing a program on the victim's computer or through remote access?
What is the purpose of a preservation letter sent to the carrier of an Internet Protocol (IP) address?
What is the purpose of a preservation letter sent to the carrier of an Internet Protocol (IP) address?
Which of the following crimes involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which of the following crimes involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Which of the following is the correct definition of phishing?
Which of the following is the correct definition of phishing?
What is the purpose of a search engine?
What is the purpose of a search engine?
What is the definition of spooling?
What is the definition of spooling?
What is the purpose of a web browser?
What is the purpose of a web browser?