California Cyberbullying Laws
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which division is responsible for the investigation of unauthorized computer accesses?

  • LAPD E-Forms
  • Commercial Crimes Division
  • Internal Audits and Inspections Division
  • Computer Crimes Unit (correct)
  • What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

  • To provide a list of frequently used terminologies in computer-related crimes.
  • To assist officers in identifying computer-related crimes and terminology. (correct)
  • To review and conduct audits or inspections on computer-related crimes.
  • To document evidence during the preliminary investigation of a computer-related crime.
  • Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

  • In LAPD E-Forms
  • In the Internal Audits and Inspections Division
  • On the Department's Local Area Network (LAN) (correct)
  • Attached to the Administrative Order
  • Who will review the directive and determine whether an audit or inspection will be conducted?

    <p>Internal Audits and Inspections Division</p> Signup and view all the answers

    What is the subject of the administrative order?

    <p>Computer-Related Crimes - Field Notebook Divider</p> Signup and view all the answers

    What is the primary purpose of the Computer Crimes Unit (CCU)?

    <p>To investigate unauthorized computer accesses.</p> Signup and view all the answers

    Which organization operates the Internet Crime Complaint Center (IC3)?

    <p>Federal Bureau of Investigation (FBI)</p> Signup and view all the answers

    What should law enforcement do if a victim is not eligible for criminal action?

    <p>Refer the victim to take civil action</p> Signup and view all the answers

    What is the purpose of a preservation letter in a computer-related crime investigation?

    <p>To capture subscriber information before it expires or is deleted</p> Signup and view all the answers

    What is the definition of a Denial of Service (DOS) Attack?

    <p>Taking over a website by installing a program on the victim's computer</p> Signup and view all the answers

    What is the purpose of an Internet Protocol (IP) address?

    <p>To identify a particular computer on the internet</p> Signup and view all the answers

    Which company provides access to the internet?

    <p>All of the above</p> Signup and view all the answers

    Which of the following is NOT a question asked in the text?

    <p>Does the victim have any server logs?</p> Signup and view all the answers

    What is the victim's account log on ID?

    <p>The victim's account log on ID is the email address associated with their social media account.</p> Signup and view all the answers

    When did the victim last access the social media account?

    <p>The victim last accessed the social media account before the unauthorized access.</p> Signup and view all the answers

    Did the victim report the unauthorized access to the social media site?

    <p>The text does not specify whether the victim reported the unauthorized access or not.</p> Signup and view all the answers

    What data was deleted, copied or altered?

    <p>The text does not specify what data was deleted, copied or altered.</p> Signup and view all the answers

    Does the victim have a copy of the examiner's report?

    <p>The text does not specify whether the victim has a copy of the examiner's report or not.</p> Signup and view all the answers

    Which of the following best describes phishing?

    <p>Requesting confidential information over the internet under false pretenses</p> Signup and view all the answers

    What is a search engine?

    <p>A program that allows the user to search for information on the internet</p> Signup and view all the answers

    What is a secure internet access?

    <p>Access that requires a password to connect a device to the internet access point</p> Signup and view all the answers

    What is a social network?

    <p>A website that allows users to be part of a virtual community</p> Signup and view all the answers

    What is spooling?

    <p>Fraudulent emails in which the sender's email address and other parts of the email header are altered</p> Signup and view all the answers

    What is a web browser?

    <p>A program used to access the internet</p> Signup and view all the answers

    Which section of the California Penal Code addresses crimes involving unauthorized computer access, commonly known as 'hacking'?

    <p>Section 502(c)</p> Signup and view all the answers

    What are examples of Unauthorized Computer Access (UCA)?

    <p>All of the above</p> Signup and view all the answers

    Which crimes may be involved in an Unauthorized Computer Access (UCA) case?

    <p>Both extortion and denial of service attack</p> Signup and view all the answers

    What crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through "phishing"?

    <p>Grand Theft and Petty Theft</p> Signup and view all the answers

    Which crime involves the willful and malicious following or harassment of another person through electronic communication with the intent to place that person in reasonable fear for their safety?

    <p>Cyber Stalking</p> Signup and view all the answers

    Which crime involves knowingly and without consent impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?

    <p>False Personation</p> Signup and view all the answers

    More Like This

    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws
    54 questions
    California Cyberbullying Laws
    18 questions
    California Cyberbullying Laws Quiz
    18 questions
    Use Quizgecko on...
    Browser
    Browser