Podcast
Questions and Answers
Which social media accounts were targeted?
Which social media accounts were targeted?
- Facebook and Instagram (correct)
- Facebook and Twitter
- Twitter and Instagram
- Facebook, Twitter, and Instagram
What is the victim's account log on ID?
What is the victim's account log on ID?
- Not mentioned in the text (correct)
- Victim123
- JaneSmith456
- JohnDoe123
When did the victim last access the social media account?
When did the victim last access the social media account?
- One month ago
- One year ago
- One week ago
- Not mentioned in the text (correct)
When was the victim unable to access his/her social media account?
When was the victim unable to access his/her social media account?
Did the victim report the unauthorized access to the social media site (e.g., Facebook)?
Did the victim report the unauthorized access to the social media site (e.g., Facebook)?
Did the victim download their IP activity?
Did the victim download their IP activity?
Which organization operates the Internet Crime Complaint Center (IC3)?
Which organization operates the Internet Crime Complaint Center (IC3)?
What is the purpose of the IC3?
What is the purpose of the IC3?
When should a preservation letter be sent for an Internet Protocol (IP) address?
When should a preservation letter be sent for an Internet Protocol (IP) address?
What is the purpose of a preservation letter?
What is the purpose of a preservation letter?
What is the definition of hacking?
What is the definition of hacking?
What is the purpose of a laptop?
What is the purpose of a laptop?
Which section of the California Penal Code addresses crimes related to unauthorized computer access?
Which section of the California Penal Code addresses crimes related to unauthorized computer access?
Which crime is commonly referred to as 'hacking'?
Which crime is commonly referred to as 'hacking'?
Which crime involves tricking the victim through spoofed emails in order to commit theft?
Which crime involves tricking the victim through spoofed emails in order to commit theft?
Which crime involves willfully and maliciously following or harassing another person through electronic communication?
Which crime involves willfully and maliciously following or harassing another person through electronic communication?
Which crime involves knowingly impersonating another person through electronic means for harmful purposes?
Which crime involves knowingly impersonating another person through electronic means for harmful purposes?
Which crime involves using electronic communication to instill fear or harass another person?
Which crime involves using electronic communication to instill fear or harass another person?
Which of the following is an example of phishing?
Which of the following is an example of phishing?
What is the purpose of a search engine?
What is the purpose of a search engine?
What is the difference between secure and non-secure internet access?
What is the difference between secure and non-secure internet access?
Which of the following is an example of spooling?
Which of the following is an example of spooling?
What is the function of a web browser?
What is the function of a web browser?
What are the two most common types of wireless connections?
What are the two most common types of wireless connections?
Which department has primary investigative responsibility for unauthorized computer accesses?
Which department has primary investigative responsibility for unauthorized computer accesses?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
Where can officers find a copy of the Computer-Related Crimes Field Notebook Divider, Form 18.52.00?
What will the Commanding Officer, Internal Audits and Inspections Division, review and determine?
What will the Commanding Officer, Internal Audits and Inspections Division, review and determine?
What is the subject of Administrative Order No. 4?
What is the subject of Administrative Order No. 4?
What is the purpose of the activated Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?
What is the purpose of the activated Computer-Related Crimes - Field Notebook Divider, Form 18.52.00?