Podcast Beta
Questions and Answers
Which social media account(s) were targeted in the incident?
When was the victim last able to access their social media account?
Did the victim report the unauthorized access to the social media site?
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
Who is responsible for reviewing the directive and determining whether an audit or inspection will be conducted?
Signup and view all the answers
Which unit has the primary investigative responsibility for unauthorized computer accesses?
Signup and view all the answers
Which of the following is a program used to access the internet?
Signup and view all the answers
What is the address of a specific website or file on the internet called?
Signup and view all the answers
What is the term used to describe fraudulent emails in which the sender's email address and other parts of the email header are altered to appear as though the email originated from a different source?
Signup and view all the answers
What is the term used to describe a program that allows the user to search for information on the internet?
Signup and view all the answers
Which section of the California Penal Code addresses crimes involving unauthorized computer access, commonly referred to as 'hacking'?
Signup and view all the answers
Which crime involves the suspect tricking the victim through email to buy/sell/ship goods, money, or services?
Signup and view all the answers
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Signup and view all the answers
Which crime involves electronically distributing personal identifying information about another person, with the intent to place that person in reasonable fear for their safety?
Signup and view all the answers
Which organization operates the Internet Crime Complaint Center (IC3)?
Signup and view all the answers
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
Signup and view all the answers
What is the main difference between a desktop computer and a laptop?
Signup and view all the answers
What is the definition of hacking?
Signup and view all the answers
Which division has primary investigative responsibility for unauthorized computer accesses?
Signup and view all the answers
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
What is the distribution code for the Computer-Related Crimes - Field Notebook Divider?
Signup and view all the answers
Which of the following is NOT a question that needs to be answered during a digital forensic investigation?
Signup and view all the answers
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
Signup and view all the answers
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Signup and view all the answers
Which of the following is the most common type of wireless connection?
Signup and view all the answers
What is the purpose of a web browser?
Signup and view all the answers
What is the definition of phishing?
Signup and view all the answers
What is the purpose of a search engine?
Signup and view all the answers
Which crime is commonly referred to as 'hacking'?
Signup and view all the answers
Which crime involves following or harassing another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Signup and view all the answers
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Signup and view all the answers
Which crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through email?
Signup and view all the answers
Which of the following is NOT a type of cybercrime mentioned in the text?
Signup and view all the answers
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
Which of the following is a correct definition of a Desktop Computer(Tower)?
Signup and view all the answers
What is the purpose of the preservation letter sent to the carrier of an Internet Protocol (IP) address?
Signup and view all the answers
Which of the following crimes is commonly referred to as 'hacking'?
Signup and view all the answers
Which crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through email?
Signup and view all the answers
Which crime involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Signup and view all the answers
Which crime involves following or harassing another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Signup and view all the answers
Which of the following is NOT a question that should be asked during a cybercrime investigation?
Signup and view all the answers
What type of data might be deleted, copied, or altered during a cybercrime incident?
Signup and view all the answers
Which of the following is the purpose of a preservation letter sent to the carrier of an Internet Protocol (IP) address?
Signup and view all the answers
Which unit within the LAPD has the primary responsibility for investigating unauthorized computer accesses?
Signup and view all the answers
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
Which section of the California Penal Code specifically addresses crimes involving unauthorized computer access, commonly referred to as 'hacking'?
Signup and view all the answers
Which of the following crimes involves taking over a website by installing a program on the victim's computer or through remote access?
Signup and view all the answers
What is the purpose of a preservation letter sent to the carrier of an Internet Protocol (IP) address?
Signup and view all the answers
Which of the following crimes involves impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Signup and view all the answers
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
Which of the following is the correct definition of phishing?
Signup and view all the answers
What is the purpose of a search engine?
Signup and view all the answers
What is the definition of spooling?
Signup and view all the answers
What is the purpose of a web browser?
Signup and view all the answers