Podcast
Questions and Answers
Which division is responsible for the investigation of unauthorized computer accesses?
Which division is responsible for the investigation of unauthorized computer accesses?
- LAPD E-Forms
- Commercial Crimes Division
- Internal Audits and Inspections Division
- Computer Crimes Unit (correct)
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
- To provide a list of frequently used terminologies in computer-related crimes.
- To assist officers in identifying computer-related crimes and terminology. (correct)
- To review and conduct audits or inspections on computer-related crimes.
- To document evidence during the preliminary investigation of a computer-related crime.
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
- In LAPD E-Forms
- In the Internal Audits and Inspections Division
- On the Department's Local Area Network (LAN) (correct)
- Attached to the Administrative Order
Who will review the directive and determine whether an audit or inspection will be conducted?
Who will review the directive and determine whether an audit or inspection will be conducted?
What is the subject of the administrative order?
What is the subject of the administrative order?
What is the primary purpose of the Computer Crimes Unit (CCU)?
What is the primary purpose of the Computer Crimes Unit (CCU)?
Which organization operates the Internet Crime Complaint Center (IC3)?
Which organization operates the Internet Crime Complaint Center (IC3)?
What should law enforcement do if a victim is not eligible for criminal action?
What should law enforcement do if a victim is not eligible for criminal action?
What is the purpose of a preservation letter in a computer-related crime investigation?
What is the purpose of a preservation letter in a computer-related crime investigation?
What is the definition of a Denial of Service (DOS) Attack?
What is the definition of a Denial of Service (DOS) Attack?
What is the purpose of an Internet Protocol (IP) address?
What is the purpose of an Internet Protocol (IP) address?
Which company provides access to the internet?
Which company provides access to the internet?
Which of the following is NOT a question asked in the text?
Which of the following is NOT a question asked in the text?
What is the victim's account log on ID?
What is the victim's account log on ID?
When did the victim last access the social media account?
When did the victim last access the social media account?
Did the victim report the unauthorized access to the social media site?
Did the victim report the unauthorized access to the social media site?
What data was deleted, copied or altered?
What data was deleted, copied or altered?
Does the victim have a copy of the examiner's report?
Does the victim have a copy of the examiner's report?
Which of the following best describes phishing?
Which of the following best describes phishing?
What is a search engine?
What is a search engine?
What is a secure internet access?
What is a secure internet access?
What is a social network?
What is a social network?
What is spooling?
What is spooling?
What is a web browser?
What is a web browser?
Which section of the California Penal Code addresses crimes involving unauthorized computer access, commonly known as 'hacking'?
Which section of the California Penal Code addresses crimes involving unauthorized computer access, commonly known as 'hacking'?
What are examples of Unauthorized Computer Access (UCA)?
What are examples of Unauthorized Computer Access (UCA)?
Which crimes may be involved in an Unauthorized Computer Access (UCA) case?
Which crimes may be involved in an Unauthorized Computer Access (UCA) case?
What crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through "phishing"?
What crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through "phishing"?
Which crime involves the willful and malicious following or harassment of another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Which crime involves the willful and malicious following or harassment of another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Which crime involves knowingly and without consent impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves knowingly and without consent impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?