Social Media Account Security Quiz
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which social media accounts were targeted?

  • Facebook and Instagram (correct)
  • Facebook and Twitter
  • Twitter and Instagram
  • Facebook, Twitter, and Instagram
  • What is the victim's account log on ID?

  • Not mentioned in the text (correct)
  • Victim123
  • JaneSmith456
  • JohnDoe123
  • When did the victim last access the social media account?

  • One month ago
  • One year ago
  • One week ago
  • Not mentioned in the text (correct)
  • When was the victim unable to access his/her social media account?

    <p>Not mentioned in the text</p> Signup and view all the answers

    Did the victim report the unauthorized access to the social media site (e.g., Facebook)?

    <p>Not mentioned in the text</p> Signup and view all the answers

    Did the victim download their IP activity?

    <p>Not mentioned in the text</p> Signup and view all the answers

    Which organization operates the Internet Crime Complaint Center (IC3)?

    <p>Federal Bureau of Investigation (FBI)</p> Signup and view all the answers

    What is the purpose of the IC3?

    <p>All of the above</p> Signup and view all the answers

    When should a preservation letter be sent for an Internet Protocol (IP) address?

    <p>Immediately after capturing the IP address</p> Signup and view all the answers

    What is the purpose of a preservation letter?

    <p>To request subscriber information from an ISP</p> Signup and view all the answers

    What is the definition of hacking?

    <p>All of the above</p> Signup and view all the answers

    What is the purpose of a laptop?

    <p>To be a portable computer</p> Signup and view all the answers

    Which section of the California Penal Code addresses crimes related to unauthorized computer access?

    <p>Section 502(c)</p> Signup and view all the answers

    Which crime is commonly referred to as 'hacking'?

    <p>Unauthorized Computer Access</p> Signup and view all the answers

    Which crime involves tricking the victim through spoofed emails in order to commit theft?

    <p>Grand Theft</p> Signup and view all the answers

    Which crime involves willfully and maliciously following or harassing another person through electronic communication?

    <p>Cyber Stalking</p> Signup and view all the answers

    Which crime involves knowingly impersonating another person through electronic means for harmful purposes?

    <p>False Personation</p> Signup and view all the answers

    Which crime involves using electronic communication to instill fear or harass another person?

    <p>Harassing Electronic Communication</p> Signup and view all the answers

    Which of the following is an example of phishing?

    <p>Requesting confidential information over the internet under false pretenses</p> Signup and view all the answers

    What is the purpose of a search engine?

    <p>To allow users to search for information on the internet</p> Signup and view all the answers

    What is the difference between secure and non-secure internet access?

    <p>Secure access requires a password, while non-secure access does not</p> Signup and view all the answers

    Which of the following is an example of spooling?

    <p>Fraudulent emails with altered sender information</p> Signup and view all the answers

    What is the function of a web browser?

    <p>To access the internet</p> Signup and view all the answers

    What are the two most common types of wireless connections?

    <p>Wi-Fi and Bluetooth</p> Signup and view all the answers

    Which department has primary investigative responsibility for unauthorized computer accesses?

    <p>Computer Crimes Unit</p> Signup and view all the answers

    What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

    <p>To assist officers in identifying computer-related crimes and terminology</p> Signup and view all the answers

    Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?

    <p>In the LAPD E-Forms on the Department's Local Area Network (LAN)</p> Signup and view all the answers

    What will the Commanding Officer, Internal Audits and Inspections Division, review and determine?

    <p>Whether an audit or inspection will be conducted</p> Signup and view all the answers

    What is the subject of Administrative Order No. 4?

    <p>Computer-related crimes</p> Signup and view all the answers

    What is the purpose of the activated Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?

    <p>To assist officers in accurately identifying and documenting computer-related crimes</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser