Social Media Account Security Quiz

SelectiveEuphoria avatar
SelectiveEuphoria
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

Which social media accounts were targeted?

Facebook and Instagram

What is the victim's account log on ID?

Not mentioned in the text

When did the victim last access the social media account?

Not mentioned in the text

When was the victim unable to access his/her social media account?

<p>Not mentioned in the text</p> Signup and view all the answers

Did the victim report the unauthorized access to the social media site (e.g., Facebook)?

<p>Not mentioned in the text</p> Signup and view all the answers

Did the victim download their IP activity?

<p>Not mentioned in the text</p> Signup and view all the answers

Which organization operates the Internet Crime Complaint Center (IC3)?

<p>Federal Bureau of Investigation (FBI)</p> Signup and view all the answers

What is the purpose of the IC3?

<p>All of the above</p> Signup and view all the answers

When should a preservation letter be sent for an Internet Protocol (IP) address?

<p>Immediately after capturing the IP address</p> Signup and view all the answers

What is the purpose of a preservation letter?

<p>To request subscriber information from an ISP</p> Signup and view all the answers

What is the definition of hacking?

<p>All of the above</p> Signup and view all the answers

What is the purpose of a laptop?

<p>To be a portable computer</p> Signup and view all the answers

Which section of the California Penal Code addresses crimes related to unauthorized computer access?

<p>Section 502(c)</p> Signup and view all the answers

Which crime is commonly referred to as 'hacking'?

<p>Unauthorized Computer Access</p> Signup and view all the answers

Which crime involves tricking the victim through spoofed emails in order to commit theft?

<p>Grand Theft</p> Signup and view all the answers

Which crime involves willfully and maliciously following or harassing another person through electronic communication?

<p>Cyber Stalking</p> Signup and view all the answers

Which crime involves knowingly impersonating another person through electronic means for harmful purposes?

<p>False Personation</p> Signup and view all the answers

Which crime involves using electronic communication to instill fear or harass another person?

<p>Harassing Electronic Communication</p> Signup and view all the answers

Which of the following is an example of phishing?

<p>Requesting confidential information over the internet under false pretenses</p> Signup and view all the answers

What is the purpose of a search engine?

<p>To allow users to search for information on the internet</p> Signup and view all the answers

What is the difference between secure and non-secure internet access?

<p>Secure access requires a password, while non-secure access does not</p> Signup and view all the answers

Which of the following is an example of spooling?

<p>Fraudulent emails with altered sender information</p> Signup and view all the answers

What is the function of a web browser?

<p>To access the internet</p> Signup and view all the answers

What are the two most common types of wireless connections?

<p>Wi-Fi and Bluetooth</p> Signup and view all the answers

Which department has primary investigative responsibility for unauthorized computer accesses?

<p>Computer Crimes Unit</p> Signup and view all the answers

What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

<p>To assist officers in identifying computer-related crimes and terminology</p> Signup and view all the answers

Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

<p>In the LAPD E-Forms on the Department's Local Area Network (LAN)</p> Signup and view all the answers

What will the Commanding Officer, Internal Audits and Inspections Division, review and determine?

<p>Whether an audit or inspection will be conducted</p> Signup and view all the answers

What is the subject of Administrative Order No. 4?

<p>Computer-related crimes</p> Signup and view all the answers

What is the purpose of the activated Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

<p>To assist officers in accurately identifying and documenting computer-related crimes</p> Signup and view all the answers

Use Quizgecko on...
Browser
Browser