Podcast
Questions and Answers
Which division is responsible for the investigation of unauthorized computer accesses?
Which division is responsible for the investigation of unauthorized computer accesses?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Who will review the directive and determine whether an audit or inspection will be conducted?
Who will review the directive and determine whether an audit or inspection will be conducted?
Signup and view all the answers
What is the subject of the administrative order?
What is the subject of the administrative order?
Signup and view all the answers
What is the primary purpose of the Computer Crimes Unit (CCU)?
What is the primary purpose of the Computer Crimes Unit (CCU)?
Signup and view all the answers
Which organization operates the Internet Crime Complaint Center (IC3)?
Which organization operates the Internet Crime Complaint Center (IC3)?
Signup and view all the answers
What should law enforcement do if a victim is not eligible for criminal action?
What should law enforcement do if a victim is not eligible for criminal action?
Signup and view all the answers
What is the purpose of a preservation letter in a computer-related crime investigation?
What is the purpose of a preservation letter in a computer-related crime investigation?
Signup and view all the answers
What is the definition of a Denial of Service (DOS) Attack?
What is the definition of a Denial of Service (DOS) Attack?
Signup and view all the answers
What is the purpose of an Internet Protocol (IP) address?
What is the purpose of an Internet Protocol (IP) address?
Signup and view all the answers
Which company provides access to the internet?
Which company provides access to the internet?
Signup and view all the answers
Which of the following is NOT a question asked in the text?
Which of the following is NOT a question asked in the text?
Signup and view all the answers
What is the victim's account log on ID?
What is the victim's account log on ID?
Signup and view all the answers
When did the victim last access the social media account?
When did the victim last access the social media account?
Signup and view all the answers
Did the victim report the unauthorized access to the social media site?
Did the victim report the unauthorized access to the social media site?
Signup and view all the answers
What data was deleted, copied or altered?
What data was deleted, copied or altered?
Signup and view all the answers
Does the victim have a copy of the examiner's report?
Does the victim have a copy of the examiner's report?
Signup and view all the answers
Which of the following best describes phishing?
Which of the following best describes phishing?
Signup and view all the answers
What is a search engine?
What is a search engine?
Signup and view all the answers
What is a secure internet access?
What is a secure internet access?
Signup and view all the answers
What is a social network?
What is a social network?
Signup and view all the answers
What is spooling?
What is spooling?
Signup and view all the answers
What is a web browser?
What is a web browser?
Signup and view all the answers
Which section of the California Penal Code addresses crimes involving unauthorized computer access, commonly known as 'hacking'?
Which section of the California Penal Code addresses crimes involving unauthorized computer access, commonly known as 'hacking'?
Signup and view all the answers
What are examples of Unauthorized Computer Access (UCA)?
What are examples of Unauthorized Computer Access (UCA)?
Signup and view all the answers
Which crimes may be involved in an Unauthorized Computer Access (UCA) case?
Which crimes may be involved in an Unauthorized Computer Access (UCA) case?
Signup and view all the answers
What crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through "phishing"?
What crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through "phishing"?
Signup and view all the answers
Which crime involves the willful and malicious following or harassment of another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Which crime involves the willful and malicious following or harassment of another person through electronic communication with the intent to place that person in reasonable fear for their safety?
Signup and view all the answers
Which crime involves knowingly and without consent impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Which crime involves knowingly and without consent impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?
Signup and view all the answers