Deck 3: E-Discovery Planning Tools

ملء الشاشة (f)
exit full mode
سؤال
Under which circumstance is a targeted discovery scope probably the most efficient?

A) a liability lawsuit involving all of a company's products
B) a fraud investigation of dozens of employees over ten years
C) a class action lawsuit by thousands of customers
D) a contractual dispute involving one customer
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which task is most likely to require a digital forensics tool?

A) hard drive image capture
B) keyword searches on documents
C) analysis of databases that contain inventory data
D) review of e-mails sent during a range of dates
سؤال
Why would you use an MD5 algorithm?

A) to hide sensitive information
B) to ensure data authenticity
C) for secure data transfers
D) to recover corrupted information
سؤال
In which situation is a broad e-discovery scope most feasible?

A) a large company with multiple locations
B) a large company that has a consistent backup regimen
C) a company with a small IT infrastructure
D) a company with many data servers
سؤال
Which of the following is typically NOT a consideration in the e-discovery planning stage?

A) look at the size of the opponent's network
B) large companies typically have archived backup files
C) smaller companies don't have as many IT resources
D) a targeted e-discovery scope might be more useful with smaller companies
سؤال
Which of the following is true about broad e-discovery scopes?

A) keywords and date ranges are used to narrow the focus
B) several discovery requests are usually made
C) it increases the prospect of acquiring data that could be useful
D) it can give you information about the opponent's network
سؤال
What do trial presentation tools use to import and export documents from litigation databases?

A) upload templates
B) load files
C) TIF files
D) data formats
سؤال
In what kind of trial does the judge hear all the evidence and determine the outcome?

A) jury trial
B) mediation
C) bench trial
D) arbitration
سؤال
What does the e-discovery scope help to determine?

A) the maximum penalty in a criminal case
B) the amount of data to be collected
C) the total cost of the digital forensics process
D) which people should be interviewed
سؤال
Why might you want to use a digital hash when collecting digital data?

A) to validate that the data hasn't been modified
B) to encrypt the data so the opponent cannot read it
C) to expedite the collection process
D) to prevent accidental deletion of the data
سؤال
Before a trial, key evidence is transferred from a format suitable for the courtroom to the litigation database.
سؤال
The acquisition of data in the e-discovery process is usually very inexpensive.
سؤال
Which of the following is true about a targeted discovery scope versus a broad discovery scope?

A) the initial amount of data collected is smaller
B) initially, a larger amount of data is collected
C) finding responsive data can take longer
D) numerous custodians are targeted at first, and then narrowed
سؤال
Storage and media costs tend to decrease as more data is collected.
سؤال
What method of authentication is used when transferring data between people or between physical locations on removable media?

A) chain-of-custody form
B) Secure Hash Algorithm
C) analog transfer form
D) discovery tracker
سؤال
Which of the following is likely to hinder the data collection process?

A) all data is on a single server
B) encrypted data
C) networks with little security
D) a network with a single domain
سؤال
Which of the following is true about large data collections using a broad scope?

A) most of the data will be relevant
B) network latency is never a problem
C) the main advantage is the cost
D) a challenge to the request is more likely
سؤال
Why might the location of the data be a consideration when planning the discovery scope?

A) the data might be in a foreign language
B) currency values fluctuate from region to region
C) privacy laws vary by country
D) data is downloaded faster from remote locations
سؤال
A targeted e-discovery scope starts with a narrow focus and gradually expands the focus.
سؤال
A load file can contain data related to documents it contains such as selected metadata.
سؤال
Nextpoint Discovery Cloud works entirely in the _________ so there's no local software to purchase.
سؤال
Match between columns
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
reverse funnel method
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
Discovery Attender
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
e-discovery scope
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
digital hash
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
Access Data AD Summation
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
targeted e-discovery scope
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
load file
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
eDiscovery Toolbox
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
ImageMAKER Discovery Assistant
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
broad e-discovery scope
سؤال
Match between columns
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
reverse funnel method
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
Discovery Attender
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
e-discovery scope
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
digital hash
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
Access Data AD Summation
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
targeted e-discovery scope
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
load file
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
eDiscovery Toolbox
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
ImageMAKER Discovery Assistant
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
broad e-discovery scope
سؤال
A tear-out, also known as a ______________, is a software feature for emphasizing parts of a document, photo, video, and so forth.
سؤال
The e-discovery _________ helps determine the amount of data to be collected or searched.
سؤال
Trial ______________ tools are developed for one user with a limited amount of preprocessed material.
سؤال
Match between columns
it's aimed at decreasing processing costs associated with large amounts of data.
reverse funnel method
it's aimed at decreasing processing costs associated with large amounts of data.
Discovery Attender
it's aimed at decreasing processing costs associated with large amounts of data.
e-discovery scope
it's aimed at decreasing processing costs associated with large amounts of data.
digital hash
it's aimed at decreasing processing costs associated with large amounts of data.
Access Data AD Summation
it's aimed at decreasing processing costs associated with large amounts of data.
targeted e-discovery scope
it's aimed at decreasing processing costs associated with large amounts of data.
load file
it's aimed at decreasing processing costs associated with large amounts of data.
eDiscovery Toolbox
it's aimed at decreasing processing costs associated with large amounts of data.
ImageMAKER Discovery Assistant
it's aimed at decreasing processing costs associated with large amounts of data.
broad e-discovery scope
سؤال
Match between columns
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
reverse funnel method
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
Discovery Attender
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
e-discovery scope
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
digital hash
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
Access Data AD Summation
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
targeted e-discovery scope
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
load file
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
eDiscovery Toolbox
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
ImageMAKER Discovery Assistant
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
broad e-discovery scope
سؤال
Enkive is designed to be used with an e-mail system and retains and purges e-mail based on an organization's ____________ policies.
سؤال
Match between columns
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
reverse funnel method
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
Discovery Attender
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
e-discovery scope
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
digital hash
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
Access Data AD Summation
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
targeted e-discovery scope
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
load file
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
eDiscovery Toolbox
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
ImageMAKER Discovery Assistant
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
broad e-discovery scope
سؤال
Match between columns
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
reverse funnel method
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
Discovery Attender
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
e-discovery scope
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
digital hash
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
Access Data AD Summation
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
targeted e-discovery scope
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
load file
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
eDiscovery Toolbox
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
ImageMAKER Discovery Assistant
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
broad e-discovery scope
سؤال
Match between columns
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
reverse funnel method
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
Discovery Attender
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
e-discovery scope
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
digital hash
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
Access Data AD Summation
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
targeted e-discovery scope
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
load file
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
eDiscovery Toolbox
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
ImageMAKER Discovery Assistant
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
broad e-discovery scope
سؤال
The main advantage of Catalyst Repository Systems software is the grid-based system for ______________ support.
سؤال
A _______ file is a set of scanned images or electronically processed files that might contain attachments to documents, e-mails, or files.
سؤال
Being uncertain what data on the system actually is evidence can be a reason to use a __________ e-discovery scope.
سؤال
Match between columns
helps determine the amount of data to be collected or searched
reverse funnel method
helps determine the amount of data to be collected or searched
Discovery Attender
helps determine the amount of data to be collected or searched
e-discovery scope
helps determine the amount of data to be collected or searched
digital hash
helps determine the amount of data to be collected or searched
Access Data AD Summation
helps determine the amount of data to be collected or searched
targeted e-discovery scope
helps determine the amount of data to be collected or searched
load file
helps determine the amount of data to be collected or searched
eDiscovery Toolbox
helps determine the amount of data to be collected or searched
ImageMAKER Discovery Assistant
helps determine the amount of data to be collected or searched
broad e-discovery scope
سؤال
Using mediators and _____________ is becoming a common requirement in many contracts to avoid the expense of jury trials.
سؤال
Match between columns
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
reverse funnel method
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
Discovery Attender
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
e-discovery scope
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
digital hash
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
Access Data AD Summation
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
targeted e-discovery scope
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
load file
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
eDiscovery Toolbox
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
ImageMAKER Discovery Assistant
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
broad e-discovery scope
سؤال
A ___________ e-discovery scope begins with small, focused data collections and expands based on parsing and reviewing data during the initial collection.
سؤال
Match between columns
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
reverse funnel method
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
Discovery Attender
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
e-discovery scope
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
digital hash
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
Access Data AD Summation
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
targeted e-discovery scope
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
load file
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
eDiscovery Toolbox
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
ImageMAKER Discovery Assistant
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
broad e-discovery scope
سؤال
What are some legal considerations that most be taken into account when planning the discovery scope?
سؤال
How does data authentication play a part in the e-discovery process?
سؤال
How does cloud computing pose a challenge for the e-discovery process?
سؤال
Describe two factors to take into consideration during the e-discovery planning stage.
سؤال
Why is communication between attorneys and IT personnel critical?
سؤال
Describe a targeted e-discovery scope.
سؤال
How can the e-discovery scope affect the costs of e-discovery?
سؤال
Which e-discovery scope is most likely to generate additional discovery requests? Why?
سؤال
Compare a targeted e-discovery scope with a broad e-discovery scope.
سؤال
List three questions that an attorney can pose to IT professionals to elicit valuable insights.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: E-Discovery Planning Tools
1
Under which circumstance is a targeted discovery scope probably the most efficient?

A) a liability lawsuit involving all of a company's products
B) a fraud investigation of dozens of employees over ten years
C) a class action lawsuit by thousands of customers
D) a contractual dispute involving one customer
D
2
Which task is most likely to require a digital forensics tool?

A) hard drive image capture
B) keyword searches on documents
C) analysis of databases that contain inventory data
D) review of e-mails sent during a range of dates
A
3
Why would you use an MD5 algorithm?

A) to hide sensitive information
B) to ensure data authenticity
C) for secure data transfers
D) to recover corrupted information
B
4
In which situation is a broad e-discovery scope most feasible?

A) a large company with multiple locations
B) a large company that has a consistent backup regimen
C) a company with a small IT infrastructure
D) a company with many data servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is typically NOT a consideration in the e-discovery planning stage?

A) look at the size of the opponent's network
B) large companies typically have archived backup files
C) smaller companies don't have as many IT resources
D) a targeted e-discovery scope might be more useful with smaller companies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is true about broad e-discovery scopes?

A) keywords and date ranges are used to narrow the focus
B) several discovery requests are usually made
C) it increases the prospect of acquiring data that could be useful
D) it can give you information about the opponent's network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
What do trial presentation tools use to import and export documents from litigation databases?

A) upload templates
B) load files
C) TIF files
D) data formats
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
In what kind of trial does the judge hear all the evidence and determine the outcome?

A) jury trial
B) mediation
C) bench trial
D) arbitration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
What does the e-discovery scope help to determine?

A) the maximum penalty in a criminal case
B) the amount of data to be collected
C) the total cost of the digital forensics process
D) which people should be interviewed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Why might you want to use a digital hash when collecting digital data?

A) to validate that the data hasn't been modified
B) to encrypt the data so the opponent cannot read it
C) to expedite the collection process
D) to prevent accidental deletion of the data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Before a trial, key evidence is transferred from a format suitable for the courtroom to the litigation database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
The acquisition of data in the e-discovery process is usually very inexpensive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is true about a targeted discovery scope versus a broad discovery scope?

A) the initial amount of data collected is smaller
B) initially, a larger amount of data is collected
C) finding responsive data can take longer
D) numerous custodians are targeted at first, and then narrowed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Storage and media costs tend to decrease as more data is collected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
What method of authentication is used when transferring data between people or between physical locations on removable media?

A) chain-of-custody form
B) Secure Hash Algorithm
C) analog transfer form
D) discovery tracker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is likely to hinder the data collection process?

A) all data is on a single server
B) encrypted data
C) networks with little security
D) a network with a single domain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is true about large data collections using a broad scope?

A) most of the data will be relevant
B) network latency is never a problem
C) the main advantage is the cost
D) a challenge to the request is more likely
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Why might the location of the data be a consideration when planning the discovery scope?

A) the data might be in a foreign language
B) currency values fluctuate from region to region
C) privacy laws vary by country
D) data is downloaded faster from remote locations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
A targeted e-discovery scope starts with a narrow focus and gradually expands the focus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
A load file can contain data related to documents it contains such as selected metadata.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Nextpoint Discovery Cloud works entirely in the _________ so there's no local software to purchase.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match between columns
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
reverse funnel method
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
Discovery Attender
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
e-discovery scope
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
digital hash
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
Access Data AD Summation
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
targeted e-discovery scope
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
load file
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
eDiscovery Toolbox
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
ImageMAKER Discovery Assistant
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
broad e-discovery scope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match between columns
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
reverse funnel method
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
Discovery Attender
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
e-discovery scope
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
digital hash
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
Access Data AD Summation
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
targeted e-discovery scope
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
load file
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
eDiscovery Toolbox
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
ImageMAKER Discovery Assistant
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
broad e-discovery scope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
A tear-out, also known as a ______________, is a software feature for emphasizing parts of a document, photo, video, and so forth.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
The e-discovery _________ helps determine the amount of data to be collected or searched.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Trial ______________ tools are developed for one user with a limited amount of preprocessed material.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match between columns
it's aimed at decreasing processing costs associated with large amounts of data.
reverse funnel method
it's aimed at decreasing processing costs associated with large amounts of data.
Discovery Attender
it's aimed at decreasing processing costs associated with large amounts of data.
e-discovery scope
it's aimed at decreasing processing costs associated with large amounts of data.
digital hash
it's aimed at decreasing processing costs associated with large amounts of data.
Access Data AD Summation
it's aimed at decreasing processing costs associated with large amounts of data.
targeted e-discovery scope
it's aimed at decreasing processing costs associated with large amounts of data.
load file
it's aimed at decreasing processing costs associated with large amounts of data.
eDiscovery Toolbox
it's aimed at decreasing processing costs associated with large amounts of data.
ImageMAKER Discovery Assistant
it's aimed at decreasing processing costs associated with large amounts of data.
broad e-discovery scope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Match between columns
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
reverse funnel method
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
Discovery Attender
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
e-discovery scope
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
digital hash
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
Access Data AD Summation
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
targeted e-discovery scope
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
load file
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
eDiscovery Toolbox
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
ImageMAKER Discovery Assistant
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
broad e-discovery scope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Enkive is designed to be used with an e-mail system and retains and purges e-mail based on an organization's ____________ policies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Match between columns
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
reverse funnel method
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
Discovery Attender
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
e-discovery scope
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
digital hash
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
Access Data AD Summation
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
targeted e-discovery scope
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
load file
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
eDiscovery Toolbox
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
ImageMAKER Discovery Assistant
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
broad e-discovery scope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match between columns
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
reverse funnel method
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
Discovery Attender
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
e-discovery scope
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
digital hash
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
Access Data AD Summation
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
targeted e-discovery scope
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
load file
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
eDiscovery Toolbox
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
ImageMAKER Discovery Assistant
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
broad e-discovery scope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Match between columns
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
reverse funnel method
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
Discovery Attender
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
e-discovery scope
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
digital hash
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
Access Data AD Summation
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
targeted e-discovery scope
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
load file
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
eDiscovery Toolbox
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
ImageMAKER Discovery Assistant
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
broad e-discovery scope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
The main advantage of Catalyst Repository Systems software is the grid-based system for ______________ support.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
A _______ file is a set of scanned images or electronically processed files that might contain attachments to documents, e-mails, or files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Being uncertain what data on the system actually is evidence can be a reason to use a __________ e-discovery scope.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Match between columns
helps determine the amount of data to be collected or searched
reverse funnel method
helps determine the amount of data to be collected or searched
Discovery Attender
helps determine the amount of data to be collected or searched
e-discovery scope
helps determine the amount of data to be collected or searched
digital hash
helps determine the amount of data to be collected or searched
Access Data AD Summation
helps determine the amount of data to be collected or searched
targeted e-discovery scope
helps determine the amount of data to be collected or searched
load file
helps determine the amount of data to be collected or searched
eDiscovery Toolbox
helps determine the amount of data to be collected or searched
ImageMAKER Discovery Assistant
helps determine the amount of data to be collected or searched
broad e-discovery scope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Using mediators and _____________ is becoming a common requirement in many contracts to avoid the expense of jury trials.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Match between columns
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
reverse funnel method
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
Discovery Attender
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
e-discovery scope
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
digital hash
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
Access Data AD Summation
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
targeted e-discovery scope
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
load file
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
eDiscovery Toolbox
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
ImageMAKER Discovery Assistant
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
broad e-discovery scope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
A ___________ e-discovery scope begins with small, focused data collections and expands based on parsing and reviewing data during the initial collection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match between columns
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
reverse funnel method
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
Discovery Attender
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
e-discovery scope
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
digital hash
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
Access Data AD Summation
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
targeted e-discovery scope
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
load file
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
eDiscovery Toolbox
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
ImageMAKER Discovery Assistant
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
broad e-discovery scope
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are some legal considerations that most be taken into account when planning the discovery scope?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
How does data authentication play a part in the e-discovery process?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
How does cloud computing pose a challenge for the e-discovery process?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Describe two factors to take into consideration during the e-discovery planning stage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Why is communication between attorneys and IT personnel critical?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Describe a targeted e-discovery scope.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
How can the e-discovery scope affect the costs of e-discovery?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which e-discovery scope is most likely to generate additional discovery requests? Why?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Compare a targeted e-discovery scope with a broad e-discovery scope.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
List three questions that an attorney can pose to IT professionals to elicit valuable insights.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.