California Cyberbullying Laws
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which social media accounts were targeted?

  • LinkedIn
  • Twitter
  • Facebook (correct)
  • Instagram
  • When did the victim last access the social media account?

  • Last week (correct)
  • Last month
  • Yesterday
  • Last year
  • Did the victim report the unauthorized access to the social media site?

  • The victim doesn't have a social media account
  • Yes (correct)
  • No
  • Not mentioned
  • According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

    <p>To assist officers in identifying computer-related crimes and terminology</p> Signup and view all the answers

    According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

    <p>On the Department's Local Area Network (LAN)</p> Signup and view all the answers

    According to the text, what is the primary investigative responsibility of the Computer Crimes Unit (CCU), Commercial Crimes Division (CCD)?

    <p>To investigate unauthorized computer accesses</p> Signup and view all the answers

    Which section of the California Penal Code addresses crimes involving unauthorized computer access commonly referred to as 'hacking'?

    <p>Section 502(c)</p> Signup and view all the answers

    Which crime involves tricking victims into buying/selling/shipping goods, money, or services through spoofed emails?

    <p>Grand Theft</p> Signup and view all the answers

    Which crime involves the repeated following or harassment of another person through electronic communication with the intent to place that person in reasonable fear for their safety?

    <p>Cyber Stalking</p> Signup and view all the answers

    Which crime involves knowingly and without consent impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?

    <p>False Personation</p> Signup and view all the answers

    Which of the following is an example of phishing?

    <p>Requesting confidential information over the internet under false pretenses</p> Signup and view all the answers

    What is the purpose of a search engine?

    <p>To search for information on the internet</p> Signup and view all the answers

    What is the difference between secure and non-secure internet access?

    <p>Secure access requires a password, while non-secure access does not</p> Signup and view all the answers

    Which of the following is a web browser?

    <p>Internet Explorer</p> Signup and view all the answers

    Which law enforcement agency should a victim of cyberbullying in the City of Los Angeles contact?

    <p>Los Angeles Police Department</p> Signup and view all the answers

    What is the purpose of the Internet Crime Complaint Center (IC3)?

    <p>All of the above</p> Signup and view all the answers

    What should a detective do upon being assigned a computer-related crime?

    <p>Send a preservation letter to the carrier of the IP address</p> Signup and view all the answers

    What is the purpose of an Internet Protocol (IP) address?

    <p>To identify a particular computer on the internet</p> Signup and view all the answers

    More Like This

    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws
    30 questions
    California Cyberbullying Laws Quiz
    18 questions
    Use Quizgecko on...
    Browser
    Browser