Social Media Account Security Quiz
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which social media accounts were targeted?

  • Facebook and Instagram (correct)
  • Facebook and Twitter
  • Twitter and Instagram
  • Facebook, Twitter, and Instagram

What is the victim's account log on ID?

  • Not mentioned in the text (correct)
  • Victim123
  • JaneSmith456
  • JohnDoe123

When did the victim last access the social media account?

  • One month ago
  • One year ago
  • One week ago
  • Not mentioned in the text (correct)

When was the victim unable to access his/her social media account?

<p>Not mentioned in the text (A)</p> Signup and view all the answers

Did the victim report the unauthorized access to the social media site (e.g., Facebook)?

<p>Not mentioned in the text (B)</p> Signup and view all the answers

Did the victim download their IP activity?

<p>Not mentioned in the text (B)</p> Signup and view all the answers

Which organization operates the Internet Crime Complaint Center (IC3)?

<p>Federal Bureau of Investigation (FBI) (C)</p> Signup and view all the answers

What is the purpose of the IC3?

<p>All of the above (D)</p> Signup and view all the answers

When should a preservation letter be sent for an Internet Protocol (IP) address?

<p>Immediately after capturing the IP address (B)</p> Signup and view all the answers

What is the purpose of a preservation letter?

<p>To request subscriber information from an ISP (B)</p> Signup and view all the answers

What is the definition of hacking?

<p>All of the above (D)</p> Signup and view all the answers

What is the purpose of a laptop?

<p>To be a portable computer (B)</p> Signup and view all the answers

Which section of the California Penal Code addresses crimes related to unauthorized computer access?

<p>Section 502(c) (B)</p> Signup and view all the answers

Which crime is commonly referred to as 'hacking'?

<p>Unauthorized Computer Access (C)</p> Signup and view all the answers

Which crime involves tricking the victim through spoofed emails in order to commit theft?

<p>Grand Theft (B)</p> Signup and view all the answers

Which crime involves willfully and maliciously following or harassing another person through electronic communication?

<p>Cyber Stalking (C)</p> Signup and view all the answers

Which crime involves knowingly impersonating another person through electronic means for harmful purposes?

<p>False Personation (A)</p> Signup and view all the answers

Which crime involves using electronic communication to instill fear or harass another person?

<p>Harassing Electronic Communication (A)</p> Signup and view all the answers

Which of the following is an example of phishing?

<p>Requesting confidential information over the internet under false pretenses (D)</p> Signup and view all the answers

What is the purpose of a search engine?

<p>To allow users to search for information on the internet (A)</p> Signup and view all the answers

What is the difference between secure and non-secure internet access?

<p>Secure access requires a password, while non-secure access does not (B)</p> Signup and view all the answers

Which of the following is an example of spooling?

<p>Fraudulent emails with altered sender information (B)</p> Signup and view all the answers

What is the function of a web browser?

<p>To access the internet (C)</p> Signup and view all the answers

What are the two most common types of wireless connections?

<p>Wi-Fi and Bluetooth (C)</p> Signup and view all the answers

Which department has primary investigative responsibility for unauthorized computer accesses?

<p>Computer Crimes Unit (C)</p> Signup and view all the answers

What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

<p>To assist officers in identifying computer-related crimes and terminology (C)</p> Signup and view all the answers

Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

<p>In the LAPD E-Forms on the Department's Local Area Network (LAN) (C)</p> Signup and view all the answers

What will the Commanding Officer, Internal Audits and Inspections Division, review and determine?

<p>Whether an audit or inspection will be conducted (A)</p> Signup and view all the answers

What is the subject of Administrative Order No. 4?

<p>Computer-related crimes (C)</p> Signup and view all the answers

What is the purpose of the activated Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

<p>To assist officers in accurately identifying and documenting computer-related crimes (D)</p> Signup and view all the answers
Use Quizgecko on...
Browser
Browser