Questions and Answers
Which social media accounts were targeted?
Facebook and Instagram
What is the victim's account log on ID?
Not mentioned in the text
When did the victim last access the social media account?
Not mentioned in the text
When was the victim unable to access his/her social media account?
Signup and view all the answers
Did the victim report the unauthorized access to the social media site (e.g., Facebook)?
Signup and view all the answers
Did the victim download their IP activity?
Signup and view all the answers
Which organization operates the Internet Crime Complaint Center (IC3)?
Signup and view all the answers
What is the purpose of the IC3?
Signup and view all the answers
When should a preservation letter be sent for an Internet Protocol (IP) address?
Signup and view all the answers
What is the purpose of a preservation letter?
Signup and view all the answers
What is the definition of hacking?
Signup and view all the answers
What is the purpose of a laptop?
Signup and view all the answers
Which section of the California Penal Code addresses crimes related to unauthorized computer access?
Signup and view all the answers
Which crime is commonly referred to as 'hacking'?
Signup and view all the answers
Which crime involves tricking the victim through spoofed emails in order to commit theft?
Signup and view all the answers
Which crime involves willfully and maliciously following or harassing another person through electronic communication?
Signup and view all the answers
Which crime involves knowingly impersonating another person through electronic means for harmful purposes?
Signup and view all the answers
Which crime involves using electronic communication to instill fear or harass another person?
Signup and view all the answers
Which of the following is an example of phishing?
Signup and view all the answers
What is the purpose of a search engine?
Signup and view all the answers
What is the difference between secure and non-secure internet access?
Signup and view all the answers
Which of the following is an example of spooling?
Signup and view all the answers
What is the function of a web browser?
Signup and view all the answers
What are the two most common types of wireless connections?
Signup and view all the answers
Which department has primary investigative responsibility for unauthorized computer accesses?
Signup and view all the answers
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Signup and view all the answers
What will the Commanding Officer, Internal Audits and Inspections Division, review and determine?
Signup and view all the answers
What is the subject of Administrative Order No. 4?
Signup and view all the answers
What is the purpose of the activated Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Signup and view all the answers