Deck 3: E-Discovery Planning Tools

Full screen (f)
exit full mode
Question
Under which circumstance is a targeted discovery scope probably the most efficient?

A) a liability lawsuit involving all of a company's products
B) a fraud investigation of dozens of employees over ten years
C) a class action lawsuit by thousands of customers
D) a contractual dispute involving one customer
Use Space or
up arrow
down arrow
to flip the card.
Question
Which task is most likely to require a digital forensics tool?

A) hard drive image capture
B) keyword searches on documents
C) analysis of databases that contain inventory data
D) review of e-mails sent during a range of dates
Question
Why would you use an MD5 algorithm?

A) to hide sensitive information
B) to ensure data authenticity
C) for secure data transfers
D) to recover corrupted information
Question
In which situation is a broad e-discovery scope most feasible?

A) a large company with multiple locations
B) a large company that has a consistent backup regimen
C) a company with a small IT infrastructure
D) a company with many data servers
Question
Which of the following is typically NOT a consideration in the e-discovery planning stage?

A) look at the size of the opponent's network
B) large companies typically have archived backup files
C) smaller companies don't have as many IT resources
D) a targeted e-discovery scope might be more useful with smaller companies
Question
Which of the following is true about broad e-discovery scopes?

A) keywords and date ranges are used to narrow the focus
B) several discovery requests are usually made
C) it increases the prospect of acquiring data that could be useful
D) it can give you information about the opponent's network
Question
What do trial presentation tools use to import and export documents from litigation databases?

A) upload templates
B) load files
C) TIF files
D) data formats
Question
In what kind of trial does the judge hear all the evidence and determine the outcome?

A) jury trial
B) mediation
C) bench trial
D) arbitration
Question
What does the e-discovery scope help to determine?

A) the maximum penalty in a criminal case
B) the amount of data to be collected
C) the total cost of the digital forensics process
D) which people should be interviewed
Question
Why might you want to use a digital hash when collecting digital data?

A) to validate that the data hasn't been modified
B) to encrypt the data so the opponent cannot read it
C) to expedite the collection process
D) to prevent accidental deletion of the data
Question
Before a trial, key evidence is transferred from a format suitable for the courtroom to the litigation database.
Question
The acquisition of data in the e-discovery process is usually very inexpensive.
Question
Which of the following is true about a targeted discovery scope versus a broad discovery scope?

A) the initial amount of data collected is smaller
B) initially, a larger amount of data is collected
C) finding responsive data can take longer
D) numerous custodians are targeted at first, and then narrowed
Question
Storage and media costs tend to decrease as more data is collected.
Question
What method of authentication is used when transferring data between people or between physical locations on removable media?

A) chain-of-custody form
B) Secure Hash Algorithm
C) analog transfer form
D) discovery tracker
Question
Which of the following is likely to hinder the data collection process?

A) all data is on a single server
B) encrypted data
C) networks with little security
D) a network with a single domain
Question
Which of the following is true about large data collections using a broad scope?

A) most of the data will be relevant
B) network latency is never a problem
C) the main advantage is the cost
D) a challenge to the request is more likely
Question
Why might the location of the data be a consideration when planning the discovery scope?

A) the data might be in a foreign language
B) currency values fluctuate from region to region
C) privacy laws vary by country
D) data is downloaded faster from remote locations
Question
A targeted e-discovery scope starts with a narrow focus and gradually expands the focus.
Question
A load file can contain data related to documents it contains such as selected metadata.
Question
Nextpoint Discovery Cloud works entirely in the _________ so there's no local software to purchase.
Question
Match between columns
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
reverse funnel method
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
Discovery Attender
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
e-discovery scope
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
digital hash
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
Access Data AD Summation
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
targeted e-discovery scope
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
load file
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
eDiscovery Toolbox
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
ImageMAKER Discovery Assistant
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
broad e-discovery scope
Question
Match between columns
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
reverse funnel method
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
Discovery Attender
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
e-discovery scope
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
digital hash
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
Access Data AD Summation
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
targeted e-discovery scope
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
load file
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
eDiscovery Toolbox
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
ImageMAKER Discovery Assistant
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
broad e-discovery scope
Question
A tear-out, also known as a ______________, is a software feature for emphasizing parts of a document, photo, video, and so forth.
Question
The e-discovery _________ helps determine the amount of data to be collected or searched.
Question
Trial ______________ tools are developed for one user with a limited amount of preprocessed material.
Question
Match between columns
it's aimed at decreasing processing costs associated with large amounts of data.
reverse funnel method
it's aimed at decreasing processing costs associated with large amounts of data.
Discovery Attender
it's aimed at decreasing processing costs associated with large amounts of data.
e-discovery scope
it's aimed at decreasing processing costs associated with large amounts of data.
digital hash
it's aimed at decreasing processing costs associated with large amounts of data.
Access Data AD Summation
it's aimed at decreasing processing costs associated with large amounts of data.
targeted e-discovery scope
it's aimed at decreasing processing costs associated with large amounts of data.
load file
it's aimed at decreasing processing costs associated with large amounts of data.
eDiscovery Toolbox
it's aimed at decreasing processing costs associated with large amounts of data.
ImageMAKER Discovery Assistant
it's aimed at decreasing processing costs associated with large amounts of data.
broad e-discovery scope
Question
Match between columns
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
reverse funnel method
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
Discovery Attender
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
e-discovery scope
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
digital hash
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
Access Data AD Summation
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
targeted e-discovery scope
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
load file
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
eDiscovery Toolbox
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
ImageMAKER Discovery Assistant
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
broad e-discovery scope
Question
Enkive is designed to be used with an e-mail system and retains and purges e-mail based on an organization's ____________ policies.
Question
Match between columns
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
reverse funnel method
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
Discovery Attender
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
e-discovery scope
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
digital hash
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
Access Data AD Summation
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
targeted e-discovery scope
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
load file
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
eDiscovery Toolbox
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
ImageMAKER Discovery Assistant
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
broad e-discovery scope
Question
Match between columns
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
reverse funnel method
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
Discovery Attender
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
e-discovery scope
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
digital hash
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
Access Data AD Summation
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
targeted e-discovery scope
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
load file
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
eDiscovery Toolbox
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
ImageMAKER Discovery Assistant
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
broad e-discovery scope
Question
Match between columns
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
reverse funnel method
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
Discovery Attender
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
e-discovery scope
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
digital hash
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
Access Data AD Summation
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
targeted e-discovery scope
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
load file
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
eDiscovery Toolbox
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
ImageMAKER Discovery Assistant
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
broad e-discovery scope
Question
The main advantage of Catalyst Repository Systems software is the grid-based system for ______________ support.
Question
A _______ file is a set of scanned images or electronically processed files that might contain attachments to documents, e-mails, or files.
Question
Being uncertain what data on the system actually is evidence can be a reason to use a __________ e-discovery scope.
Question
Match between columns
helps determine the amount of data to be collected or searched
reverse funnel method
helps determine the amount of data to be collected or searched
Discovery Attender
helps determine the amount of data to be collected or searched
e-discovery scope
helps determine the amount of data to be collected or searched
digital hash
helps determine the amount of data to be collected or searched
Access Data AD Summation
helps determine the amount of data to be collected or searched
targeted e-discovery scope
helps determine the amount of data to be collected or searched
load file
helps determine the amount of data to be collected or searched
eDiscovery Toolbox
helps determine the amount of data to be collected or searched
ImageMAKER Discovery Assistant
helps determine the amount of data to be collected or searched
broad e-discovery scope
Question
Using mediators and _____________ is becoming a common requirement in many contracts to avoid the expense of jury trials.
Question
Match between columns
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
reverse funnel method
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
Discovery Attender
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
e-discovery scope
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
digital hash
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
Access Data AD Summation
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
targeted e-discovery scope
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
load file
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
eDiscovery Toolbox
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
ImageMAKER Discovery Assistant
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
broad e-discovery scope
Question
A ___________ e-discovery scope begins with small, focused data collections and expands based on parsing and reviewing data during the initial collection.
Question
Match between columns
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
reverse funnel method
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
Discovery Attender
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
e-discovery scope
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
digital hash
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
Access Data AD Summation
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
targeted e-discovery scope
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
load file
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
eDiscovery Toolbox
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
ImageMAKER Discovery Assistant
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
broad e-discovery scope
Question
What are some legal considerations that most be taken into account when planning the discovery scope?
Question
How does data authentication play a part in the e-discovery process?
Question
How does cloud computing pose a challenge for the e-discovery process?
Question
Describe two factors to take into consideration during the e-discovery planning stage.
Question
Why is communication between attorneys and IT personnel critical?
Question
Describe a targeted e-discovery scope.
Question
How can the e-discovery scope affect the costs of e-discovery?
Question
Which e-discovery scope is most likely to generate additional discovery requests? Why?
Question
Compare a targeted e-discovery scope with a broad e-discovery scope.
Question
List three questions that an attorney can pose to IT professionals to elicit valuable insights.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: E-Discovery Planning Tools
1
Under which circumstance is a targeted discovery scope probably the most efficient?

A) a liability lawsuit involving all of a company's products
B) a fraud investigation of dozens of employees over ten years
C) a class action lawsuit by thousands of customers
D) a contractual dispute involving one customer
D
2
Which task is most likely to require a digital forensics tool?

A) hard drive image capture
B) keyword searches on documents
C) analysis of databases that contain inventory data
D) review of e-mails sent during a range of dates
A
3
Why would you use an MD5 algorithm?

A) to hide sensitive information
B) to ensure data authenticity
C) for secure data transfers
D) to recover corrupted information
B
4
In which situation is a broad e-discovery scope most feasible?

A) a large company with multiple locations
B) a large company that has a consistent backup regimen
C) a company with a small IT infrastructure
D) a company with many data servers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is typically NOT a consideration in the e-discovery planning stage?

A) look at the size of the opponent's network
B) large companies typically have archived backup files
C) smaller companies don't have as many IT resources
D) a targeted e-discovery scope might be more useful with smaller companies
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is true about broad e-discovery scopes?

A) keywords and date ranges are used to narrow the focus
B) several discovery requests are usually made
C) it increases the prospect of acquiring data that could be useful
D) it can give you information about the opponent's network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What do trial presentation tools use to import and export documents from litigation databases?

A) upload templates
B) load files
C) TIF files
D) data formats
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
In what kind of trial does the judge hear all the evidence and determine the outcome?

A) jury trial
B) mediation
C) bench trial
D) arbitration
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What does the e-discovery scope help to determine?

A) the maximum penalty in a criminal case
B) the amount of data to be collected
C) the total cost of the digital forensics process
D) which people should be interviewed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Why might you want to use a digital hash when collecting digital data?

A) to validate that the data hasn't been modified
B) to encrypt the data so the opponent cannot read it
C) to expedite the collection process
D) to prevent accidental deletion of the data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Before a trial, key evidence is transferred from a format suitable for the courtroom to the litigation database.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The acquisition of data in the e-discovery process is usually very inexpensive.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is true about a targeted discovery scope versus a broad discovery scope?

A) the initial amount of data collected is smaller
B) initially, a larger amount of data is collected
C) finding responsive data can take longer
D) numerous custodians are targeted at first, and then narrowed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Storage and media costs tend to decrease as more data is collected.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
What method of authentication is used when transferring data between people or between physical locations on removable media?

A) chain-of-custody form
B) Secure Hash Algorithm
C) analog transfer form
D) discovery tracker
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is likely to hinder the data collection process?

A) all data is on a single server
B) encrypted data
C) networks with little security
D) a network with a single domain
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is true about large data collections using a broad scope?

A) most of the data will be relevant
B) network latency is never a problem
C) the main advantage is the cost
D) a challenge to the request is more likely
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Why might the location of the data be a consideration when planning the discovery scope?

A) the data might be in a foreign language
B) currency values fluctuate from region to region
C) privacy laws vary by country
D) data is downloaded faster from remote locations
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
A targeted e-discovery scope starts with a narrow focus and gradually expands the focus.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
A load file can contain data related to documents it contains such as selected metadata.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Nextpoint Discovery Cloud works entirely in the _________ so there's no local software to purchase.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match between columns
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
reverse funnel method
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
Discovery Attender
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
e-discovery scope
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
digital hash
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
Access Data AD Summation
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
targeted e-discovery scope
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
load file
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
eDiscovery Toolbox
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
ImageMAKER Discovery Assistant
an e-discovery method that attempts to capture as much data as possible, on the premise that relevant data will be found
broad e-discovery scope
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match between columns
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
reverse funnel method
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
Discovery Attender
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
e-discovery scope
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
digital hash
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
Access Data AD Summation
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
targeted e-discovery scope
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
load file
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
eDiscovery Toolbox
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
ImageMAKER Discovery Assistant
designed to capture, search, and process Windows-based documents and Microsoft Outlook PST files
broad e-discovery scope
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
A tear-out, also known as a ______________, is a software feature for emphasizing parts of a document, photo, video, and so forth.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The e-discovery _________ helps determine the amount of data to be collected or searched.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Trial ______________ tools are developed for one user with a limited amount of preprocessed material.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match between columns
it's aimed at decreasing processing costs associated with large amounts of data.
reverse funnel method
it's aimed at decreasing processing costs associated with large amounts of data.
Discovery Attender
it's aimed at decreasing processing costs associated with large amounts of data.
e-discovery scope
it's aimed at decreasing processing costs associated with large amounts of data.
digital hash
it's aimed at decreasing processing costs associated with large amounts of data.
Access Data AD Summation
it's aimed at decreasing processing costs associated with large amounts of data.
targeted e-discovery scope
it's aimed at decreasing processing costs associated with large amounts of data.
load file
it's aimed at decreasing processing costs associated with large amounts of data.
eDiscovery Toolbox
it's aimed at decreasing processing costs associated with large amounts of data.
ImageMAKER Discovery Assistant
it's aimed at decreasing processing costs associated with large amounts of data.
broad e-discovery scope
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match between columns
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
reverse funnel method
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
Discovery Attender
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
e-discovery scope
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
digital hash
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
Access Data AD Summation
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
targeted e-discovery scope
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
load file
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
eDiscovery Toolbox
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
ImageMAKER Discovery Assistant
can contain data related to documents it contains, such as selected metadata, coded data, and extracted text
broad e-discovery scope
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Enkive is designed to be used with an e-mail system and retains and purges e-mail based on an organization's ____________ policies.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Match between columns
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
reverse funnel method
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
Discovery Attender
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
e-discovery scope
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
digital hash
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
Access Data AD Summation
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
targeted e-discovery scope
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
load file
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
eDiscovery Toolbox
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
ImageMAKER Discovery Assistant
an e-discovery method that focuses on small data collections, usually from specified data locations or custodians
broad e-discovery scope
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match between columns
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
reverse funnel method
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
Discovery Attender
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
e-discovery scope
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
digital hash
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
Access Data AD Summation
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
targeted e-discovery scope
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
load file
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
eDiscovery Toolbox
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
ImageMAKER Discovery Assistant
it has a Quick Search feature that allows broad searches, or you can conduct more complex searches with Boolean elements
broad e-discovery scope
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Match between columns
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
reverse funnel method
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
Discovery Attender
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
e-discovery scope
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
digital hash
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
Access Data AD Summation
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
targeted e-discovery scope
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
load file
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
eDiscovery Toolbox
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
ImageMAKER Discovery Assistant
a value created by using a mathematical formula that translates a file into a unique hexadecimal code value
broad e-discovery scope
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
The main advantage of Catalyst Repository Systems software is the grid-based system for ______________ support.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A _______ file is a set of scanned images or electronically processed files that might contain attachments to documents, e-mails, or files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Being uncertain what data on the system actually is evidence can be a reason to use a __________ e-discovery scope.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match between columns
helps determine the amount of data to be collected or searched
reverse funnel method
helps determine the amount of data to be collected or searched
Discovery Attender
helps determine the amount of data to be collected or searched
e-discovery scope
helps determine the amount of data to be collected or searched
digital hash
helps determine the amount of data to be collected or searched
Access Data AD Summation
helps determine the amount of data to be collected or searched
targeted e-discovery scope
helps determine the amount of data to be collected or searched
load file
helps determine the amount of data to be collected or searched
eDiscovery Toolbox
helps determine the amount of data to be collected or searched
ImageMAKER Discovery Assistant
helps determine the amount of data to be collected or searched
broad e-discovery scope
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Using mediators and _____________ is becoming a common requirement in many contracts to avoid the expense of jury trials.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match between columns
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
reverse funnel method
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
Discovery Attender
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
e-discovery scope
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
digital hash
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
Access Data AD Summation
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
targeted e-discovery scope
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
load file
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
eDiscovery Toolbox
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
ImageMAKER Discovery Assistant
it's designed mainly for working with Microsoft Exchange and Lotus Notes e-mail collections
broad e-discovery scope
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A ___________ e-discovery scope begins with small, focused data collections and expands based on parsing and reviewing data during the initial collection.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match between columns
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
reverse funnel method
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
Discovery Attender
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
e-discovery scope
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
digital hash
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
Access Data AD Summation
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
targeted e-discovery scope
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
load file
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
eDiscovery Toolbox
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
ImageMAKER Discovery Assistant
an analogy describing how discovery can begin with small, targeted data collections and expand in scope
broad e-discovery scope
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What are some legal considerations that most be taken into account when planning the discovery scope?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
How does data authentication play a part in the e-discovery process?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
How does cloud computing pose a challenge for the e-discovery process?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Describe two factors to take into consideration during the e-discovery planning stage.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Why is communication between attorneys and IT personnel critical?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe a targeted e-discovery scope.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
How can the e-discovery scope affect the costs of e-discovery?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Which e-discovery scope is most likely to generate additional discovery requests? Why?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Compare a targeted e-discovery scope with a broad e-discovery scope.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
List three questions that an attorney can pose to IT professionals to elicit valuable insights.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.