Podcast
Questions and Answers
Which unit has primary investigative responsibility for unauthorized computer accesses?
Which unit has primary investigative responsibility for unauthorized computer accesses?
- Computer Crimes Unit (CCU) (correct)
- Commanding Officer
- Commercial Crimes Division (CCD)
- Internal Audits and Inspections Division
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
- To assist officers in documenting computer-related crimes
- To assist officers in identifying computer-related crimes and terminology (correct)
- To provide immediate use and duplication of forms
- To review directives and conduct audits or inspections
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
- In the Commercial Crimes Division (CCD)
- In the Internal Audits and Inspections Division
- In the LAPD E-Forms on the Department's Local Area Network (LAN) (correct)
- Attached to the administrative order
Which of the following is a program used to access the internet?
Which of the following is a program used to access the internet?
What is the term for requesting confidential information over the internet under false pretenses?
What is the term for requesting confidential information over the internet under false pretenses?
What is the term for a website that allows users to be part of a virtual community?
What is the term for a website that allows users to be part of a virtual community?
What is the term for an Internet connection without a cable or wire?
What is the term for an Internet connection without a cable or wire?
Which of the following is NOT a question that the text asks about the victim's social media account?
Which of the following is NOT a question that the text asks about the victim's social media account?
What type of data does the text mention could have been deleted, copied, or altered?
What type of data does the text mention could have been deleted, copied, or altered?
What is the purpose of asking for the contact information of the company's 'Information Technology (IT)' person?
What is the purpose of asking for the contact information of the company's 'Information Technology (IT)' person?
Which agency operates the Internet Crime Complaint Center (IC3)?
Which agency operates the Internet Crime Complaint Center (IC3)?
Which of the following statements about cyberbullying in California is true?
Which of the following statements about cyberbullying in California is true?
What action should be taken if a victim of cybercrime lives or works in the City of Los Angeles?
What action should be taken if a victim of cybercrime lives or works in the City of Los Angeles?
What is the purpose of a preservation letter in a computer-related crime investigation?
What is the purpose of a preservation letter in a computer-related crime investigation?
Which section of the California Penal Code addresses unauthorized computer access, commonly referred to as 'hacking'?
Which section of the California Penal Code addresses unauthorized computer access, commonly referred to as 'hacking'?
Which crime involves the suspect tricking the victim into buying, selling, or shipping goods, money, or services through spoofed emails?
Which crime involves the suspect tricking the victim into buying, selling, or shipping goods, money, or services through spoofed emails?
Under which section of the California Penal Code is false personation, through electronic means, for the purpose of harming, intimidating, threatening, or defrauding another person considered a misdemeanor?
Under which section of the California Penal Code is false personation, through electronic means, for the purpose of harming, intimidating, threatening, or defrauding another person considered a misdemeanor?
Which crime involves the use of an electronic communication device to make contact with another person and address them with obscene language or threats?
Which crime involves the use of an electronic communication device to make contact with another person and address them with obscene language or threats?