Podcast
Questions and Answers
Which social media account(s) were targeted in the incident?
Which social media account(s) were targeted in the incident?
When was the victim last able to access their social media account?
When was the victim last able to access their social media account?
Did the victim report the unauthorized access to the social media site?
Did the victim report the unauthorized access to the social media site?
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
Who is responsible for reviewing the directive and determining whether an audit or inspection will be conducted?
Who is responsible for reviewing the directive and determining whether an audit or inspection will be conducted?
Signup and view all the answers
Which unit has the primary investigative responsibility for unauthorized computer accesses?
Which unit has the primary investigative responsibility for unauthorized computer accesses?
Signup and view all the answers
Which of the following is a program used to access the internet?
Which of the following is a program used to access the internet?
Signup and view all the answers
What is the address of a specific website or file on the internet called?
What is the address of a specific website or file on the internet called?
Signup and view all the answers
What is the term used to describe fraudulent emails in which the sender's email address and other parts of the email header are altered to appear as though the email originated from a different source?
What is the term used to describe fraudulent emails in which the sender's email address and other parts of the email header are altered to appear as though the email originated from a different source?
Signup and view all the answers
What is the term used to describe a program that allows the user to search for information on the internet?
What is the term used to describe a program that allows the user to search for information on the internet?
Signup and view all the answers
Which section of the California Penal Code addresses crimes involving unauthorized computer access, commonly referred to as 'hacking'?
Which section of the California Penal Code addresses crimes involving unauthorized computer access, commonly referred to as 'hacking'?
Signup and view all the answers
Which crime involves the suspect tricking the victim through email to buy/sell/ship goods, money, or services?
Which crime involves the suspect tricking the victim through email to buy/sell/ship goods, money, or services?
Signup and view all the answers
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Signup and view all the answers
Which crime involves electronically distributing personal identifying information about another person, with the intent to place that person in reasonable fear for their safety?
Which crime involves electronically distributing personal identifying information about another person, with the intent to place that person in reasonable fear for their safety?
Signup and view all the answers
Which organization operates the Internet Crime Complaint Center (IC3)?
Which organization operates the Internet Crime Complaint Center (IC3)?
Signup and view all the answers
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
Signup and view all the answers
What is the main difference between a desktop computer and a laptop?
What is the main difference between a desktop computer and a laptop?
Signup and view all the answers
What is the definition of hacking?
What is the definition of hacking?
Signup and view all the answers
Which division has primary investigative responsibility for unauthorized computer accesses?
Which division has primary investigative responsibility for unauthorized computer accesses?
Signup and view all the answers
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
What is the distribution code for the Computer-Related Crimes - Field Notebook Divider?
What is the distribution code for the Computer-Related Crimes - Field Notebook Divider?
Signup and view all the answers
Which of the following is NOT a question that needs to be answered during a digital forensic investigation?
Which of the following is NOT a question that needs to be answered during a digital forensic investigation?
Signup and view all the answers
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
Signup and view all the answers
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Signup and view all the answers
Which of the following is the most common type of wireless connection?
Which of the following is the most common type of wireless connection?
Signup and view all the answers
What is the purpose of a web browser?
What is the purpose of a web browser?
Signup and view all the answers
What is the definition of phishing?
What is the definition of phishing?
Signup and view all the answers
What is the purpose of a search engine?
What is the purpose of a search engine?
Signup and view all the answers
Which crime is commonly referred to as 'hacking'?
Which crime is commonly referred to as 'hacking'?
Signup and view all the answers
Which crime involves following or harassing another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Which crime involves following or harassing another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Signup and view all the answers
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Signup and view all the answers
Which crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through email?
Which crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through email?
Signup and view all the answers
Which of the following is NOT a type of cybercrime mentioned in the text?
Which of the following is NOT a type of cybercrime mentioned in the text?
Signup and view all the answers
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
Which of the following is a correct definition of a Desktop Computer(Tower)?
Which of the following is a correct definition of a Desktop Computer(Tower)?
Signup and view all the answers
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
Signup and view all the answers
Which of the following crimes is commonly referred to as 'hacking'?
Which of the following crimes is commonly referred to as 'hacking'?
Signup and view all the answers
Which crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through email?
Which crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through email?
Signup and view all the answers
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Signup and view all the answers
Which crime involves following or harassing another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Which crime involves following or harassing another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Signup and view all the answers
Which of the following is NOT a question that should be asked during a cybercrime investigation?
Which of the following is NOT a question that should be asked during a cybercrime investigation?
Signup and view all the answers
What type of data might be deleted, copied, or altered during a cybercrime incident?
What type of data might be deleted, copied, or altered during a cybercrime incident?
Signup and view all the answers
Which of the following is the purpose of a preservation letter sent to the carrier of an Internet Protocol (IP) address?
Which of the following is the purpose of a preservation letter sent to the carrier of an Internet Protocol (IP) address?
Signup and view all the answers
Which unit within the LAPD has the primary responsibility for investigating unauthorized computer accesses?
Which unit within the LAPD has the primary responsibility for investigating unauthorized computer accesses?
Signup and view all the answers
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
Which section of the California Penal Code specifically addresses crimes involving unauthorized computer access, commonly referred to as 'hacking'?
Which section of the California Penal Code specifically addresses crimes involving unauthorized computer access, commonly referred to as 'hacking'?
Signup and view all the answers
Which of the following crimes involves taking over a website by installing a program on the victim's computer or through remote access?
Which of the following crimes involves taking over a website by installing a program on the victim's computer or through remote access?
Signup and view all the answers
What is the purpose of a preservation letter sent to the carrier of an Internet Protocol (IP) address?
What is the purpose of a preservation letter sent to the carrier of an Internet Protocol (IP) address?
Signup and view all the answers
Which of the following crimes involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which of the following crimes involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Signup and view all the answers
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
Which of the following is the correct definition of phishing?
Which of the following is the correct definition of phishing?
Signup and view all the answers
What is the purpose of a search engine?
What is the purpose of a search engine?
Signup and view all the answers
What is the definition of spooling?
What is the definition of spooling?
Signup and view all the answers
What is the purpose of a web browser?
What is the purpose of a web browser?
Signup and view all the answers