Podcast
Questions and Answers
Which social media accounts were targeted?
Which social media accounts were targeted?
- Facebook (correct)
When did the victim last access the social media account?
When did the victim last access the social media account?
- Last week (correct)
- Last month
- Yesterday
- Last year
Did the victim report the unauthorized access to the social media site?
Did the victim report the unauthorized access to the social media site?
- The victim doesn't have a social media account
- Yes (correct)
- No
- Not mentioned
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, what is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
According to the text, where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
According to the text, what is the primary investigative responsibility of the Computer Crimes Unit (CCU), Commercial Crimes Division (CCD)?
According to the text, what is the primary investigative responsibility of the Computer Crimes Unit (CCU), Commercial Crimes Division (CCD)?
Which section of the California Penal Code addresses crimes involving unauthorized computer access commonly referred to as 'hacking'?
Which section of the California Penal Code addresses crimes involving unauthorized computer access commonly referred to as 'hacking'?
Which crime involves tricking victims into buying/selling/shipping goods, money, or services through spoofed emails?
Which crime involves tricking victims into buying/selling/shipping goods, money, or services through spoofed emails?
Which crime involves the repeated following or harassment of another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Which crime involves the repeated following or harassment of another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Which crime involves knowingly and without consent impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves knowingly and without consent impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which of the following is an example of phishing?
Which of the following is an example of phishing?
What is the purpose of a search engine?
What is the purpose of a search engine?
What is the difference between secure and non-secure internet access?
What is the difference between secure and non-secure internet access?
Which of the following is a web browser?
Which of the following is a web browser?
Which law enforcement agency should a victim of cyberbullying in the City of Los Angeles contact?
Which law enforcement agency should a victim of cyberbullying in the City of Los Angeles contact?
What is the purpose of the Internet Crime Complaint Center (IC3)?
What is the purpose of the Internet Crime Complaint Center (IC3)?
What should a detective do upon being assigned a computer-related crime?
What should a detective do upon being assigned a computer-related crime?
What is the purpose of an Internet Protocol (IP) address?
What is the purpose of an Internet Protocol (IP) address?
Flashcards are hidden until you start studying