California Cyberbullying Laws
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which California Penal Code section addresses crimes involving unauthorized computer access?

  • 487
  • 484
  • 502(c) (correct)
  • 528.5
  • What is the term commonly used to refer to unauthorized computer access?

  • Phishing
  • Cyber stalking
  • Spoofing
  • Hacking (correct)
  • Which crimes may be involved in an unauthorized computer access (UCA) crime?

  • Grand theft and petty theft
  • Extortion and/or denial of service attack (correct)
  • Criminal threats and cyber stalking
  • False personation
  • Which California Penal Code section addresses false personation through electronic means for harmful purposes?

    <p>528.5</p> Signup and view all the answers

    According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

    <p>To assist officers in identifying computer-related crimes and terminology</p> Signup and view all the answers

    According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

    <p>In LAPD E-Forms on the Department's Local Area Network (LAN)</p> Signup and view all the answers

    According to the text, what is the primary investigative responsibility of the Computer Crimes Unit (CCU)?

    <p>Investigation of unauthorized computer accesses</p> Signup and view all the answers

    Which of the following is a program used to access the internet?

    <p>Search Engine</p> Signup and view all the answers

    What is the purpose of phishing?

    <p>To obtain confidential information fraudulently</p> Signup and view all the answers

    What is the most popular social network?

    <p>Facebook</p> Signup and view all the answers

    What is the difference between secure and non-secure internet access?

    <p>Secure access requires a password, while non-secure access does not</p> Signup and view all the answers

    Which organization operates the Internet Crime Complaint Center (IC3)?

    <p>Federal Bureau of Investigation (FBI)</p> Signup and view all the answers

    What action should be taken if a victim of cyberbullying does not meet the criteria of any existing criminal code section(s)?

    <p>Refer the victim to take civil action</p> Signup and view all the answers

    What is the purpose of sending a preservation letter to the carrier of an Internet Protocol (IP) address?

    <p>To capture subscriber information and data usage</p> Signup and view all the answers

    What is the function of an Internet Service Provider (ISP)?

    <p>To provide access to the internet</p> Signup and view all the answers

    Which of the following information was the victim asked to provide regarding the unauthorized access to their social media account?

    <p>The victim's account log on ID</p> Signup and view all the answers

    Who did the victim report the unauthorized access to?

    <p>The social media site</p> Signup and view all the answers

    Did the victim have a copy of the forensic examiner's report?

    <p>The text does not mention if the victim had a copy of the report</p> Signup and view all the answers

    More Like This

    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws
    54 questions
    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws
    30 questions
    Use Quizgecko on...
    Browser
    Browser