California Cyberbullying Laws
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which unit has primary investigative responsibility for unauthorized computer accesses?

  • Computer Crimes Unit (CCU) (correct)
  • Commanding Officer
  • Commercial Crimes Division (CCD)
  • Internal Audits and Inspections Division
  • What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

  • To assist officers in documenting computer-related crimes
  • To assist officers in identifying computer-related crimes and terminology (correct)
  • To provide immediate use and duplication of forms
  • To review directives and conduct audits or inspections
  • Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

  • In the Commercial Crimes Division (CCD)
  • In the Internal Audits and Inspections Division
  • In the LAPD E-Forms on the Department's Local Area Network (LAN) (correct)
  • Attached to the administrative order
  • Which of the following is a program used to access the internet?

    <p>Web browser</p> Signup and view all the answers

    What is the term for requesting confidential information over the internet under false pretenses?

    <p>Phishing</p> Signup and view all the answers

    What is the term for a website that allows users to be part of a virtual community?

    <p>Social network</p> Signup and view all the answers

    What is the term for an Internet connection without a cable or wire?

    <p>Wireless connection</p> Signup and view all the answers

    Which of the following is NOT a question that the text asks about the victim's social media account?

    <p>Did the victim download their IP activity?</p> Signup and view all the answers

    What type of data does the text mention could have been deleted, copied, or altered?

    <p>Social media account information</p> Signup and view all the answers

    What is the purpose of asking for the contact information of the company's 'Information Technology (IT)' person?

    <p>To access server logs</p> Signup and view all the answers

    Which agency operates the Internet Crime Complaint Center (IC3)?

    <p>Federal Bureau of Investigation (FBI)</p> Signup and view all the answers

    Which of the following statements about cyberbullying in California is true?

    <p>California does not have a law against cyberbullying.</p> Signup and view all the answers

    What action should be taken if a victim of cybercrime lives or works in the City of Los Angeles?

    <p>Refer the victim to the LAPD.</p> Signup and view all the answers

    What is the purpose of a preservation letter in a computer-related crime investigation?

    <p>To capture any evidence before it expires or is deleted.</p> Signup and view all the answers

    Which section of the California Penal Code addresses unauthorized computer access, commonly referred to as 'hacking'?

    <p>Section 502(c)</p> Signup and view all the answers

    Which crime involves the suspect tricking the victim into buying, selling, or shipping goods, money, or services through spoofed emails?

    <p>Grand Theft (Via Phishing)</p> Signup and view all the answers

    Under which section of the California Penal Code is false personation, through electronic means, for the purpose of harming, intimidating, threatening, or defrauding another person considered a misdemeanor?

    <p>Section 528.5</p> Signup and view all the answers

    Which crime involves the use of an electronic communication device to make contact with another person and address them with obscene language or threats?

    <p>No Threatening Email Act</p> Signup and view all the answers

    More Like This

    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws
    54 questions
    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws
    30 questions
    Use Quizgecko on...
    Browser
    Browser