Deck 1: Introduction to E-Discovery and Digital Evidence

ملء الشاشة (f)
exit full mode
سؤال
Metadata is a legal term that refers to the actual information being retrieved.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is NOT a service model defined by NIST?

A) SaaS
B) PaaS
C) IaaS
D) NaaS
سؤال
Cloud computing is a model in which computing resources are hosted remotely.
سؤال
Which of the following is an example of metadata?

A) a paragraph in a printed document
B) words in an electronic document
C) GPS data for a photo
D) DNA extracted from blood
سؤال
Where should you look if you want to find what camera was used to take a photograph?

A) on the back of the photo file
B) in the EXIF header
C) on a hardcopy of the photo
D) in the jpg pixels
سؤال
Which of the following is NOT true about digital evidence?

A) it can pertain to a civil or criminal complaint
B) it is only found on desktop computers
C) it must be acquired by following specific procedures
D) e-mail is an example
سؤال
E-discovery is the use of advanced electronic surveillance to catch criminals in the act.
سؤال
In which computer and networking model are client software, data, and computing resources hosted remotely, so client computers and servers don't need to support as many on-site resources?

A) WAN network
B) Internetwork model
C) Cloud computing
D) Mainframe processing
سؤال
The Sedona Canada principles and the Ontario checklist for preparing a discovery plan are part of Canadian procedural law.
سؤال
What must be followed to ensure that evidence has not been tampered with or altered?

A) search warrants
B) chain of custody
C) subpoenas
D) requests for production
سؤال
Which cloud deployment method is considered the most secure?

A) public
B) hybrid
C) internal
D) private
سؤال
Which of the following is true about digital forensics?

A) device forensics focuses on network intrusion
B) a MAC time tells a digital forensics expert the hardware address of a computer
C) network forensics experts consider e-discovery a part of their job
D) e-discovery can be considered a subset of digital forensics
سؤال
Which set of rules was established in 1938 for resolving issues or legal matters in civil cases at the federal level?

A) FRCP
B) FRCrP
C) FRErP
D) FRE
سؤال
Which of the following is true about E-discovery?

A) it can be thought of as data mining
B) it consists of hard copies of court documents
C) it does not include data found on cellular phones
D) it is valid in civil cases, but not in criminal cases
سؤال
With which service model do customers select an OS and install their own applications?

A) SaaS
B) PaaS
C) NaaS
D) IaaS
سؤال
Why might you want to use the AccessData Forensic Toolkit?

A) to view document metadata
B) to examine blood evidence
C) to listen in on cell phone transmissions
D) to capture network data
سؤال
When examining digital evidence on a device, what is used to prevent data from being copied back to the evidence item inadvertently?

A) write blocker
B) live acquisitions
C) deduplication
D) forensic imaging
سؤال
The process of retrieving evidence from the data of an encrypted hard drive would be considered the job of which of the following?

A) network forensics expert
B) e-discovery expert
C) ESI administrator
D) device forensics expert
سؤال
Which of the following is NOT a cloud deployment method defined by NIST?

A) internal
B) private
C) hybrid
D) public
سؤال
In general, states' rules regarding ESI can be more lenient than federal rules.
سؤال
Dropbox is an example of the ___________ cloud service model.
سؤال
Match between columns
the application of traditional forensics procedures to acquiring computer evidence
digital evidence
the application of traditional forensics procedures to acquiring computer evidence
OCR
the application of traditional forensics procedures to acquiring computer evidence
FRCrP
the application of traditional forensics procedures to acquiring computer evidence
chain of custody
the application of traditional forensics procedures to acquiring computer evidence
e-discovery
the application of traditional forensics procedures to acquiring computer evidence
MAC times
the application of traditional forensics procedures to acquiring computer evidence
data mining
the application of traditional forensics procedures to acquiring computer evidence
native file
the application of traditional forensics procedures to acquiring computer evidence
ESI
the application of traditional forensics procedures to acquiring computer evidence
digital forensics
سؤال
In the context of e-discovery, ____________ evidence is called ESI.
سؤال
Which set of rules applies to all evidence presented in court for both civil and criminal cases?

A) FRCP
B) FRCrP
C) FRErP
D) FRE
سؤال
Match between columns
any information stored electronically or in a digital format
digital evidence
any information stored electronically or in a digital format
OCR
any information stored electronically or in a digital format
FRCrP
any information stored electronically or in a digital format
chain of custody
any information stored electronically or in a digital format
e-discovery
any information stored electronically or in a digital format
MAC times
any information stored electronically or in a digital format
data mining
any information stored electronically or in a digital format
native file
any information stored electronically or in a digital format
ESI
any information stored electronically or in a digital format
digital forensics
سؤال
Match between columns
a file in the originating application's format
digital evidence
a file in the originating application's format
OCR
a file in the originating application's format
FRCrP
a file in the originating application's format
chain of custody
a file in the originating application's format
e-discovery
a file in the originating application's format
MAC times
a file in the originating application's format
data mining
a file in the originating application's format
native file
a file in the originating application's format
ESI
a file in the originating application's format
digital forensics
سؤال
What type of software can be used to index the text contained in scanned pictures of documents?

A) TIFF
B) PDF
C) OCR
D) ESI
سؤال
Match between columns
a method used to gather information about customers or vendors by culling ESI
digital evidence
a method used to gather information about customers or vendors by culling ESI
OCR
a method used to gather information about customers or vendors by culling ESI
FRCrP
a method used to gather information about customers or vendors by culling ESI
chain of custody
a method used to gather information about customers or vendors by culling ESI
e-discovery
a method used to gather information about customers or vendors by culling ESI
MAC times
a method used to gather information about customers or vendors by culling ESI
data mining
a method used to gather information about customers or vendors by culling ESI
native file
a method used to gather information about customers or vendors by culling ESI
ESI
a method used to gather information about customers or vendors by culling ESI
digital forensics
سؤال
Match between columns
metadata that specifies dates and times that a file was modified, accessed, and created
digital evidence
metadata that specifies dates and times that a file was modified, accessed, and created
OCR
metadata that specifies dates and times that a file was modified, accessed, and created
FRCrP
metadata that specifies dates and times that a file was modified, accessed, and created
chain of custody
metadata that specifies dates and times that a file was modified, accessed, and created
e-discovery
metadata that specifies dates and times that a file was modified, accessed, and created
MAC times
metadata that specifies dates and times that a file was modified, accessed, and created
data mining
metadata that specifies dates and times that a file was modified, accessed, and created
native file
metadata that specifies dates and times that a file was modified, accessed, and created
ESI
metadata that specifies dates and times that a file was modified, accessed, and created
digital forensics
سؤال
Match between columns
gathering ESI for use in litigation
digital evidence
gathering ESI for use in litigation
OCR
gathering ESI for use in litigation
FRCrP
gathering ESI for use in litigation
chain of custody
gathering ESI for use in litigation
e-discovery
gathering ESI for use in litigation
MAC times
gathering ESI for use in litigation
data mining
gathering ESI for use in litigation
native file
gathering ESI for use in litigation
ESI
gathering ESI for use in litigation
digital forensics
سؤال
Which of the following was developed as the result of burgeoning e-commerce in the 1990s, focused on civil procedures, and has been a basis for e-discovery worldwide?

A) UN Model Law
B) European Corporate Laws
C) Canadian Rules of Civil Procedure
D) Sedona Canada Principles
سؤال
Replacing paper documents with electronic documents in PDF or TIFF format is an example of good ___________ management.
سؤال
E-Discovery can be thought of as data _________ to gather information for use in legal proceedings.
سؤال
With a __________ cloud, a person's files are on the same physical machine as another person's or organization's files.
سؤال
Match between columns
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
digital evidence
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
OCR
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
FRCrP
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
chain of custody
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
e-discovery
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
MAC times
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
data mining
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
native file
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
ESI
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
digital forensics
سؤال
Match between columns
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
digital evidence
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
OCR
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
FRCrP
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
chain of custody
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
e-discovery
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
MAC times
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
data mining
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
native file
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
ESI
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
digital forensics
سؤال
Which of the following were created by a group of lawyers and other professionals as guidelines for handling electronic documents?

A) Federal Rules of Evidence
B) Sedona Principles
C) Advisory Committee on Civil Rules
D) UN Model Law
سؤال
Match between columns
a software method of scanning a picture and converting the characters to text
digital evidence
a software method of scanning a picture and converting the characters to text
OCR
a software method of scanning a picture and converting the characters to text
FRCrP
a software method of scanning a picture and converting the characters to text
chain of custody
a software method of scanning a picture and converting the characters to text
e-discovery
a software method of scanning a picture and converting the characters to text
MAC times
a software method of scanning a picture and converting the characters to text
data mining
a software method of scanning a picture and converting the characters to text
native file
a software method of scanning a picture and converting the characters to text
ESI
a software method of scanning a picture and converting the characters to text
digital forensics
سؤال
Which Federal Rule of Evidence is relevant to the admissibility of e-mail messages?

A) Limited Admissibility
B) Relevancy and Its Limits
C) Hearsay
D) Opinions and Expert Testimony
سؤال
Match between columns
any evidence that's stored or transmitted electronically or in a digital format
digital evidence
any evidence that's stored or transmitted electronically or in a digital format
OCR
any evidence that's stored or transmitted electronically or in a digital format
FRCrP
any evidence that's stored or transmitted electronically or in a digital format
chain of custody
any evidence that's stored or transmitted electronically or in a digital format
e-discovery
any evidence that's stored or transmitted electronically or in a digital format
MAC times
any evidence that's stored or transmitted electronically or in a digital format
data mining
any evidence that's stored or transmitted electronically or in a digital format
native file
any evidence that's stored or transmitted electronically or in a digital format
ESI
any evidence that's stored or transmitted electronically or in a digital format
digital forensics
سؤال
Discuss the difference between data and metadata providing examples.
سؤال
Describe e-discovery in terms of data mining.
سؤال
Describe software as a service (SaaS). Provide an example.
سؤال
How has the introduction of digital evidence changed the FRE, if at all?
سؤال
What are the two specialties of digital forensics?
سؤال
Describe digital evidence. What are some sources of digital evidence?
سؤال
How does the volume of information involved in a case affect the e-discovery process? How can the impact be reduced?
سؤال
What is a difference between e-discovery and digital forensics?
سؤال
How does the cloud affect e-discovery?
سؤال
What is the importance of chain of custody?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Introduction to E-Discovery and Digital Evidence
1
Metadata is a legal term that refers to the actual information being retrieved.
False
2
Which of the following is NOT a service model defined by NIST?

A) SaaS
B) PaaS
C) IaaS
D) NaaS
D
3
Cloud computing is a model in which computing resources are hosted remotely.
True
4
Which of the following is an example of metadata?

A) a paragraph in a printed document
B) words in an electronic document
C) GPS data for a photo
D) DNA extracted from blood
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Where should you look if you want to find what camera was used to take a photograph?

A) on the back of the photo file
B) in the EXIF header
C) on a hardcopy of the photo
D) in the jpg pixels
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is NOT true about digital evidence?

A) it can pertain to a civil or criminal complaint
B) it is only found on desktop computers
C) it must be acquired by following specific procedures
D) e-mail is an example
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
E-discovery is the use of advanced electronic surveillance to catch criminals in the act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
In which computer and networking model are client software, data, and computing resources hosted remotely, so client computers and servers don't need to support as many on-site resources?

A) WAN network
B) Internetwork model
C) Cloud computing
D) Mainframe processing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
The Sedona Canada principles and the Ontario checklist for preparing a discovery plan are part of Canadian procedural law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
What must be followed to ensure that evidence has not been tampered with or altered?

A) search warrants
B) chain of custody
C) subpoenas
D) requests for production
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which cloud deployment method is considered the most secure?

A) public
B) hybrid
C) internal
D) private
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is true about digital forensics?

A) device forensics focuses on network intrusion
B) a MAC time tells a digital forensics expert the hardware address of a computer
C) network forensics experts consider e-discovery a part of their job
D) e-discovery can be considered a subset of digital forensics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which set of rules was established in 1938 for resolving issues or legal matters in civil cases at the federal level?

A) FRCP
B) FRCrP
C) FRErP
D) FRE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is true about E-discovery?

A) it can be thought of as data mining
B) it consists of hard copies of court documents
C) it does not include data found on cellular phones
D) it is valid in civil cases, but not in criminal cases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
With which service model do customers select an OS and install their own applications?

A) SaaS
B) PaaS
C) NaaS
D) IaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Why might you want to use the AccessData Forensic Toolkit?

A) to view document metadata
B) to examine blood evidence
C) to listen in on cell phone transmissions
D) to capture network data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
When examining digital evidence on a device, what is used to prevent data from being copied back to the evidence item inadvertently?

A) write blocker
B) live acquisitions
C) deduplication
D) forensic imaging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
The process of retrieving evidence from the data of an encrypted hard drive would be considered the job of which of the following?

A) network forensics expert
B) e-discovery expert
C) ESI administrator
D) device forensics expert
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is NOT a cloud deployment method defined by NIST?

A) internal
B) private
C) hybrid
D) public
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
In general, states' rules regarding ESI can be more lenient than federal rules.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Dropbox is an example of the ___________ cloud service model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match between columns
the application of traditional forensics procedures to acquiring computer evidence
digital evidence
the application of traditional forensics procedures to acquiring computer evidence
OCR
the application of traditional forensics procedures to acquiring computer evidence
FRCrP
the application of traditional forensics procedures to acquiring computer evidence
chain of custody
the application of traditional forensics procedures to acquiring computer evidence
e-discovery
the application of traditional forensics procedures to acquiring computer evidence
MAC times
the application of traditional forensics procedures to acquiring computer evidence
data mining
the application of traditional forensics procedures to acquiring computer evidence
native file
the application of traditional forensics procedures to acquiring computer evidence
ESI
the application of traditional forensics procedures to acquiring computer evidence
digital forensics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
In the context of e-discovery, ____________ evidence is called ESI.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which set of rules applies to all evidence presented in court for both civil and criminal cases?

A) FRCP
B) FRCrP
C) FRErP
D) FRE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Match between columns
any information stored electronically or in a digital format
digital evidence
any information stored electronically or in a digital format
OCR
any information stored electronically or in a digital format
FRCrP
any information stored electronically or in a digital format
chain of custody
any information stored electronically or in a digital format
e-discovery
any information stored electronically or in a digital format
MAC times
any information stored electronically or in a digital format
data mining
any information stored electronically or in a digital format
native file
any information stored electronically or in a digital format
ESI
any information stored electronically or in a digital format
digital forensics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match between columns
a file in the originating application's format
digital evidence
a file in the originating application's format
OCR
a file in the originating application's format
FRCrP
a file in the originating application's format
chain of custody
a file in the originating application's format
e-discovery
a file in the originating application's format
MAC times
a file in the originating application's format
data mining
a file in the originating application's format
native file
a file in the originating application's format
ESI
a file in the originating application's format
digital forensics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
What type of software can be used to index the text contained in scanned pictures of documents?

A) TIFF
B) PDF
C) OCR
D) ESI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Match between columns
a method used to gather information about customers or vendors by culling ESI
digital evidence
a method used to gather information about customers or vendors by culling ESI
OCR
a method used to gather information about customers or vendors by culling ESI
FRCrP
a method used to gather information about customers or vendors by culling ESI
chain of custody
a method used to gather information about customers or vendors by culling ESI
e-discovery
a method used to gather information about customers or vendors by culling ESI
MAC times
a method used to gather information about customers or vendors by culling ESI
data mining
a method used to gather information about customers or vendors by culling ESI
native file
a method used to gather information about customers or vendors by culling ESI
ESI
a method used to gather information about customers or vendors by culling ESI
digital forensics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match between columns
metadata that specifies dates and times that a file was modified, accessed, and created
digital evidence
metadata that specifies dates and times that a file was modified, accessed, and created
OCR
metadata that specifies dates and times that a file was modified, accessed, and created
FRCrP
metadata that specifies dates and times that a file was modified, accessed, and created
chain of custody
metadata that specifies dates and times that a file was modified, accessed, and created
e-discovery
metadata that specifies dates and times that a file was modified, accessed, and created
MAC times
metadata that specifies dates and times that a file was modified, accessed, and created
data mining
metadata that specifies dates and times that a file was modified, accessed, and created
native file
metadata that specifies dates and times that a file was modified, accessed, and created
ESI
metadata that specifies dates and times that a file was modified, accessed, and created
digital forensics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Match between columns
gathering ESI for use in litigation
digital evidence
gathering ESI for use in litigation
OCR
gathering ESI for use in litigation
FRCrP
gathering ESI for use in litigation
chain of custody
gathering ESI for use in litigation
e-discovery
gathering ESI for use in litigation
MAC times
gathering ESI for use in litigation
data mining
gathering ESI for use in litigation
native file
gathering ESI for use in litigation
ESI
gathering ESI for use in litigation
digital forensics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following was developed as the result of burgeoning e-commerce in the 1990s, focused on civil procedures, and has been a basis for e-discovery worldwide?

A) UN Model Law
B) European Corporate Laws
C) Canadian Rules of Civil Procedure
D) Sedona Canada Principles
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Replacing paper documents with electronic documents in PDF or TIFF format is an example of good ___________ management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
E-Discovery can be thought of as data _________ to gather information for use in legal proceedings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
With a __________ cloud, a person's files are on the same physical machine as another person's or organization's files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Match between columns
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
digital evidence
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
OCR
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
FRCrP
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
chain of custody
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
e-discovery
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
MAC times
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
data mining
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
native file
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
ESI
the path evidence takes from the time the investigator obtains it until the case goes to court or is dismissed
digital forensics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Match between columns
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
digital evidence
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
OCR
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
FRCrP
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
chain of custody
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
e-discovery
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
MAC times
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
data mining
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
native file
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
ESI
rules created by the U.S. Supreme Court to ensure that defendants' constitutionally guaranteed rights are protected in federal court cases
digital forensics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following were created by a group of lawyers and other professionals as guidelines for handling electronic documents?

A) Federal Rules of Evidence
B) Sedona Principles
C) Advisory Committee on Civil Rules
D) UN Model Law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Match between columns
a software method of scanning a picture and converting the characters to text
digital evidence
a software method of scanning a picture and converting the characters to text
OCR
a software method of scanning a picture and converting the characters to text
FRCrP
a software method of scanning a picture and converting the characters to text
chain of custody
a software method of scanning a picture and converting the characters to text
e-discovery
a software method of scanning a picture and converting the characters to text
MAC times
a software method of scanning a picture and converting the characters to text
data mining
a software method of scanning a picture and converting the characters to text
native file
a software method of scanning a picture and converting the characters to text
ESI
a software method of scanning a picture and converting the characters to text
digital forensics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which Federal Rule of Evidence is relevant to the admissibility of e-mail messages?

A) Limited Admissibility
B) Relevancy and Its Limits
C) Hearsay
D) Opinions and Expert Testimony
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match between columns
any evidence that's stored or transmitted electronically or in a digital format
digital evidence
any evidence that's stored or transmitted electronically or in a digital format
OCR
any evidence that's stored or transmitted electronically or in a digital format
FRCrP
any evidence that's stored or transmitted electronically or in a digital format
chain of custody
any evidence that's stored or transmitted electronically or in a digital format
e-discovery
any evidence that's stored or transmitted electronically or in a digital format
MAC times
any evidence that's stored or transmitted electronically or in a digital format
data mining
any evidence that's stored or transmitted electronically or in a digital format
native file
any evidence that's stored or transmitted electronically or in a digital format
ESI
any evidence that's stored or transmitted electronically or in a digital format
digital forensics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Discuss the difference between data and metadata providing examples.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Describe e-discovery in terms of data mining.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Describe software as a service (SaaS). Provide an example.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
How has the introduction of digital evidence changed the FRE, if at all?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What are the two specialties of digital forensics?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Describe digital evidence. What are some sources of digital evidence?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
How does the volume of information involved in a case affect the e-discovery process? How can the impact be reduced?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What is a difference between e-discovery and digital forensics?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
How does the cloud affect e-discovery?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What is the importance of chain of custody?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.