Podcast
Questions and Answers
Which California Penal Code section addresses crimes involving unauthorized computer access?
Which California Penal Code section addresses crimes involving unauthorized computer access?
What is the term commonly used to refer to unauthorized computer access?
What is the term commonly used to refer to unauthorized computer access?
Which crimes may be involved in an unauthorized computer access (UCA) crime?
Which crimes may be involved in an unauthorized computer access (UCA) crime?
Which California Penal Code section addresses false personation through electronic means for harmful purposes?
Which California Penal Code section addresses false personation through electronic means for harmful purposes?
Signup and view all the answers
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
According to the text, what is the primary investigative responsibility of the Computer Crimes Unit (CCU)?
According to the text, what is the primary investigative responsibility of the Computer Crimes Unit (CCU)?
Signup and view all the answers
Which of the following is a program used to access the internet?
Which of the following is a program used to access the internet?
Signup and view all the answers
What is the purpose of phishing?
What is the purpose of phishing?
Signup and view all the answers
What is the most popular social network?
What is the most popular social network?
Signup and view all the answers
What is the difference between secure and non-secure internet access?
What is the difference between secure and non-secure internet access?
Signup and view all the answers
Which organization operates the Internet Crime Complaint Center (IC3)?
Which organization operates the Internet Crime Complaint Center (IC3)?
Signup and view all the answers
What action should be taken if a victim of cyberbullying does not meet the criteria of any existing criminal code section(s)?
What action should be taken if a victim of cyberbullying does not meet the criteria of any existing criminal code section(s)?
Signup and view all the answers
What is the purpose of sending a preservation letter to the carrier of an Internet Protocol (IP) address?
What is the purpose of sending a preservation letter to the carrier of an Internet Protocol (IP) address?
Signup and view all the answers
What is the function of an Internet Service Provider (ISP)?
What is the function of an Internet Service Provider (ISP)?
Signup and view all the answers
Which of the following information was the victim asked to provide regarding the unauthorized access to their social media account?
Which of the following information was the victim asked to provide regarding the unauthorized access to their social media account?
Signup and view all the answers
Who did the victim report the unauthorized access to?
Who did the victim report the unauthorized access to?
Signup and view all the answers
Did the victim have a copy of the forensic examiner's report?
Did the victim have a copy of the forensic examiner's report?
Signup and view all the answers