California Cyberbullying Laws

SelectiveEuphoria avatar
SelectiveEuphoria
·
·
Download

Start Quiz

Study Flashcards

30 Questions

Which division is responsible for the investigation of unauthorized computer accesses?

Computer Crimes Unit

What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

To assist officers in identifying computer-related crimes and terminology.

Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

On the Department's Local Area Network (LAN)

Who will review the directive and determine whether an audit or inspection will be conducted?

Internal Audits and Inspections Division

What is the subject of the administrative order?

Computer-Related Crimes - Field Notebook Divider

What is the primary purpose of the Computer Crimes Unit (CCU)?

To investigate unauthorized computer accesses.

Which organization operates the Internet Crime Complaint Center (IC3)?

Federal Bureau of Investigation (FBI)

What should law enforcement do if a victim is not eligible for criminal action?

Refer the victim to take civil action

What is the purpose of a preservation letter in a computer-related crime investigation?

To capture subscriber information before it expires or is deleted

What is the definition of a Denial of Service (DOS) Attack?

Taking over a website by installing a program on the victim's computer

What is the purpose of an Internet Protocol (IP) address?

To identify a particular computer on the internet

Which company provides access to the internet?

All of the above

Which of the following is NOT a question asked in the text?

Does the victim have any server logs?

What is the victim's account log on ID?

The victim's account log on ID is the email address associated with their social media account.

When did the victim last access the social media account?

The victim last accessed the social media account before the unauthorized access.

Did the victim report the unauthorized access to the social media site?

The text does not specify whether the victim reported the unauthorized access or not.

What data was deleted, copied or altered?

The text does not specify what data was deleted, copied or altered.

Does the victim have a copy of the examiner's report?

The text does not specify whether the victim has a copy of the examiner's report or not.

Which of the following best describes phishing?

Requesting confidential information over the internet under false pretenses

What is a search engine?

A program that allows the user to search for information on the internet

What is a secure internet access?

Access that requires a password to connect a device to the internet access point

What is a social network?

A website that allows users to be part of a virtual community

What is spooling?

Fraudulent emails in which the sender's email address and other parts of the email header are altered

What is a web browser?

A program used to access the internet

Which section of the California Penal Code addresses crimes involving unauthorized computer access, commonly known as 'hacking'?

Section 502(c)

What are examples of Unauthorized Computer Access (UCA)?

All of the above

Which crimes may be involved in an Unauthorized Computer Access (UCA) case?

Both extortion and denial of service attack

What crime involves the suspect tricking the victim into buying/selling/shipping goods, money, or services through "phishing"?

Grand Theft and Petty Theft

Which crime involves the willful and malicious following or harassment of another person through electronic communication with the intent to place that person in reasonable fear for their safety?

Cyber Stalking

Which crime involves knowingly and without consent impersonating another person through electronic means for purposes of harming, intimidating, threatening, or defrauding another person?

False Personation

"California Cyberbullying Laws: Understanding Jurisdiction and Legal Options Quiz" Test your knowledge about cyberbullying laws in California and learn about jurisdiction and legal options for victims. Discover if the circumstances of a cyberbullying case meet the criteria of existing criminal code sections and find out when civil action can be pursued. Explore the implications of jurisdiction, particularly for cases involving victims living or working in the City of Los Angeles.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

California Cyberbullying Laws
18 questions
California Cyberbullying Laws
18 questions
California Cyberbullying Laws Quiz
50 questions
California Cyberbullying Laws Quiz
60 questions
Use Quizgecko on...
Browser
Browser