Podcast
Questions and Answers
Which California Penal Code section addresses crimes involving unauthorized computer access?
Which California Penal Code section addresses crimes involving unauthorized computer access?
- 487
- 484
- 502(c) (correct)
- 528.5
What is the term commonly used to refer to unauthorized computer access?
What is the term commonly used to refer to unauthorized computer access?
- Phishing
- Cyber stalking
- Spoofing
- Hacking (correct)
Which crimes may be involved in an unauthorized computer access (UCA) crime?
Which crimes may be involved in an unauthorized computer access (UCA) crime?
- Grand theft and petty theft
- Extortion and/or denial of service attack (correct)
- Criminal threats and cyber stalking
- False personation
Which California Penal Code section addresses false personation through electronic means for harmful purposes?
Which California Penal Code section addresses false personation through electronic means for harmful purposes?
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
According to the text, what is the primary investigative responsibility of the Computer Crimes Unit (CCU)?
According to the text, what is the primary investigative responsibility of the Computer Crimes Unit (CCU)?
Which of the following is a program used to access the internet?
Which of the following is a program used to access the internet?
What is the purpose of phishing?
What is the purpose of phishing?
What is the most popular social network?
What is the most popular social network?
What is the difference between secure and non-secure internet access?
What is the difference between secure and non-secure internet access?
Which organization operates the Internet Crime Complaint Center (IC3)?
Which organization operates the Internet Crime Complaint Center (IC3)?
What action should be taken if a victim of cyberbullying does not meet the criteria of any existing criminal code section(s)?
What action should be taken if a victim of cyberbullying does not meet the criteria of any existing criminal code section(s)?
What is the purpose of sending a preservation letter to the carrier of an Internet Protocol (IP) address?
What is the purpose of sending a preservation letter to the carrier of an Internet Protocol (IP) address?
What is the function of an Internet Service Provider (ISP)?
What is the function of an Internet Service Provider (ISP)?
Which of the following information was the victim asked to provide regarding the unauthorized access to their social media account?
Which of the following information was the victim asked to provide regarding the unauthorized access to their social media account?
Who did the victim report the unauthorized access to?
Who did the victim report the unauthorized access to?
Did the victim have a copy of the forensic examiner's report?
Did the victim have a copy of the forensic examiner's report?
Flashcards are hidden until you start studying