Deck 3: E-Discovery Planning Tools
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Question
Question
Question
Question
Match between columns
Question
Match between columns
Question
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Question
Question
Question
Match between columns
Question
Question
Match between columns
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 3: E-Discovery Planning Tools
1
Under which circumstance is a targeted discovery scope probably the most efficient?
A) a liability lawsuit involving all of a company's products
B) a fraud investigation of dozens of employees over ten years
C) a class action lawsuit by thousands of customers
D) a contractual dispute involving one customer
A) a liability lawsuit involving all of a company's products
B) a fraud investigation of dozens of employees over ten years
C) a class action lawsuit by thousands of customers
D) a contractual dispute involving one customer
D
2
Which task is most likely to require a digital forensics tool?
A) hard drive image capture
B) keyword searches on documents
C) analysis of databases that contain inventory data
D) review of e-mails sent during a range of dates
A) hard drive image capture
B) keyword searches on documents
C) analysis of databases that contain inventory data
D) review of e-mails sent during a range of dates
A
3
Why would you use an MD5 algorithm?
A) to hide sensitive information
B) to ensure data authenticity
C) for secure data transfers
D) to recover corrupted information
A) to hide sensitive information
B) to ensure data authenticity
C) for secure data transfers
D) to recover corrupted information
B
4
In which situation is a broad e-discovery scope most feasible?
A) a large company with multiple locations
B) a large company that has a consistent backup regimen
C) a company with a small IT infrastructure
D) a company with many data servers
A) a large company with multiple locations
B) a large company that has a consistent backup regimen
C) a company with a small IT infrastructure
D) a company with many data servers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is typically NOT a consideration in the e-discovery planning stage?
A) look at the size of the opponent's network
B) large companies typically have archived backup files
C) smaller companies don't have as many IT resources
D) a targeted e-discovery scope might be more useful with smaller companies
A) look at the size of the opponent's network
B) large companies typically have archived backup files
C) smaller companies don't have as many IT resources
D) a targeted e-discovery scope might be more useful with smaller companies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is true about broad e-discovery scopes?
A) keywords and date ranges are used to narrow the focus
B) several discovery requests are usually made
C) it increases the prospect of acquiring data that could be useful
D) it can give you information about the opponent's network
A) keywords and date ranges are used to narrow the focus
B) several discovery requests are usually made
C) it increases the prospect of acquiring data that could be useful
D) it can give you information about the opponent's network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What do trial presentation tools use to import and export documents from litigation databases?
A) upload templates
B) load files
C) TIF files
D) data formats
A) upload templates
B) load files
C) TIF files
D) data formats
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
In what kind of trial does the judge hear all the evidence and determine the outcome?
A) jury trial
B) mediation
C) bench trial
D) arbitration
A) jury trial
B) mediation
C) bench trial
D) arbitration
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What does the e-discovery scope help to determine?
A) the maximum penalty in a criminal case
B) the amount of data to be collected
C) the total cost of the digital forensics process
D) which people should be interviewed
A) the maximum penalty in a criminal case
B) the amount of data to be collected
C) the total cost of the digital forensics process
D) which people should be interviewed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Why might you want to use a digital hash when collecting digital data?
A) to validate that the data hasn't been modified
B) to encrypt the data so the opponent cannot read it
C) to expedite the collection process
D) to prevent accidental deletion of the data
A) to validate that the data hasn't been modified
B) to encrypt the data so the opponent cannot read it
C) to expedite the collection process
D) to prevent accidental deletion of the data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Before a trial, key evidence is transferred from a format suitable for the courtroom to the litigation database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The acquisition of data in the e-discovery process is usually very inexpensive.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is true about a targeted discovery scope versus a broad discovery scope?
A) the initial amount of data collected is smaller
B) initially, a larger amount of data is collected
C) finding responsive data can take longer
D) numerous custodians are targeted at first, and then narrowed
A) the initial amount of data collected is smaller
B) initially, a larger amount of data is collected
C) finding responsive data can take longer
D) numerous custodians are targeted at first, and then narrowed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Storage and media costs tend to decrease as more data is collected.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
What method of authentication is used when transferring data between people or between physical locations on removable media?
A) chain-of-custody form
B) Secure Hash Algorithm
C) analog transfer form
D) discovery tracker
A) chain-of-custody form
B) Secure Hash Algorithm
C) analog transfer form
D) discovery tracker
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is likely to hinder the data collection process?
A) all data is on a single server
B) encrypted data
C) networks with little security
D) a network with a single domain
A) all data is on a single server
B) encrypted data
C) networks with little security
D) a network with a single domain
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is true about large data collections using a broad scope?
A) most of the data will be relevant
B) network latency is never a problem
C) the main advantage is the cost
D) a challenge to the request is more likely
A) most of the data will be relevant
B) network latency is never a problem
C) the main advantage is the cost
D) a challenge to the request is more likely
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Why might the location of the data be a consideration when planning the discovery scope?
A) the data might be in a foreign language
B) currency values fluctuate from region to region
C) privacy laws vary by country
D) data is downloaded faster from remote locations
A) the data might be in a foreign language
B) currency values fluctuate from region to region
C) privacy laws vary by country
D) data is downloaded faster from remote locations
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
A targeted e-discovery scope starts with a narrow focus and gradually expands the focus.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A load file can contain data related to documents it contains such as selected metadata.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Nextpoint Discovery Cloud works entirely in the _________ so there's no local software to purchase.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
A tear-out, also known as a ______________, is a software feature for emphasizing parts of a document, photo, video, and so forth.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The e-discovery _________ helps determine the amount of data to be collected or searched.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Trial ______________ tools are developed for one user with a limited amount of preprocessed material.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Enkive is designed to be used with an e-mail system and retains and purges e-mail based on an organization's ____________ policies.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
The main advantage of Catalyst Repository Systems software is the grid-based system for ______________ support.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A _______ file is a set of scanned images or electronically processed files that might contain attachments to documents, e-mails, or files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Being uncertain what data on the system actually is evidence can be a reason to use a __________ e-discovery scope.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Using mediators and _____________ is becoming a common requirement in many contracts to avoid the expense of jury trials.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A ___________ e-discovery scope begins with small, focused data collections and expands based on parsing and reviewing data during the initial collection.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What are some legal considerations that most be taken into account when planning the discovery scope?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
How does data authentication play a part in the e-discovery process?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
How does cloud computing pose a challenge for the e-discovery process?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Describe two factors to take into consideration during the e-discovery planning stage.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Why is communication between attorneys and IT personnel critical?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe a targeted e-discovery scope.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
How can the e-discovery scope affect the costs of e-discovery?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Which e-discovery scope is most likely to generate additional discovery requests? Why?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Compare a targeted e-discovery scope with a broad e-discovery scope.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
List three questions that an attorney can pose to IT professionals to elicit valuable insights.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck