Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

E-Discovery Midterm Exam Questions With 100% Correct Answers 2023, Exams of Advanced Education

E-Discovery Midterm Exam Questions With 100% Correct Answers 2023 Bill of particulars - Correct Answer-A request to prosecution for details and evidence of an alleged crime. Consultant - Correct Answer-A person or company offering services or professional advice; consultants can testify as experts if they meet the same qualifying standards. Deposition - Correct Answer-Giving testimony under oath outside court; a key form of discovery. Digital forensics consultants - Correct Answer-A person or company offering digital forensics examination of digital; hardware or software. They can give testimony on their findings or other related matters. Discovery - Correct Answer-The process of identifying, locating, securing, and producing information and materials for use in litigation. E-discovery consultants - Correct Answer-People or companies providing a broad range of e-discovery services

Typology: Exams

2024/2025

Available from 09/05/2024

professoraxel
professoraxel 🇺🇸

3.7

(26)

9.2K documents

1 / 11

Toggle sidebar

Related documents


Partial preview of the text

Download E-Discovery Midterm Exam Questions With 100% Correct Answers 2023 and more Exams Advanced Education in PDF only on Docsity! E-Discovery Midterm Exam Questions With 100% Correct Answers 2023 Bill of particulars - Correct Answer-A request to prosecution for details and evidence of an alleged crime. Consultant - Correct Answer-A person or company offering services or professional advice; consultants can testify as experts if they meet the same qualifying standards. Deposition - Correct Answer-Giving testimony under oath outside court; a key form of discovery. Digital forensics consultants - Correct Answer-A person or company offering digital forensics examination of digital; hardware or software. They can give testimony on their findings or other related matters. Discovery - Correct Answer-The process of identifying, locating, securing, and producing information and materials for use in litigation. E-discovery consultants - Correct Answer-People or companies providing a broad range of e-discovery services or advice, from digital forensics and data collection to file conversions, database administration, and hosting; these services sometimes include trial consulting. Evidence - Correct Answer-The testimony of witness and the introduction of records, documents, exhibits objects, or any other probative matter offered for the purpose of convincing a judge, jury, or other litigation party of a fact or belief. Expert - Correct Answer-a person with special knowledge, experience, training, education or skills; can also function as a consultant. Forensics mediator - Correct Answer-A forensics expert who is neutral to the case and functions as a mediator between parties. Interrogatories - Correct Answer-Written lists of questions served by one party to another. Request for admission - Correct Answer-A form of discovery that asks the opposing party to accept or deny certain facts of the case in writing and under oath. Request for production - Correct Answer-A form of discovery, usually in writing, that requests documents, electronically stored information, or other tangible items; can also be used in criminal cases. Special master - Correct Answer-Someone appointed by the court to perform a certain role or duties; can also be used in criminal cases Summary judgment - Correct Answer-A decision rendered by the court, usually before trial, that eliminates an issue in dispute. Uniform task-based management system (UTBMS) - Correct Answer-A task- based billing system that assigns a code to each legal task. Witness impeachment - Correct Answer-The process of attacking the accuracy of a witness's testimony or showing that a witness isn't credible. E-Discovery - Correct Answer-is the process of applying the traditional legal discovery process to electronic evidence. Digital Forensics - Correct Answer-formerly known as computer forensics - is a scientific method for extracting data or evidence from a digital device, including an active network. Digital Evidence - Correct Answer-is data or files in digital format that pertain to a civil or criminal complaint. Metadata - Correct Answer-is information about that data. Data about Data. Cloud Computing - Correct Answer-is on demand access to remote servers, software, application and other computing resources. NIST (National Institute of standard Techonology) - Correct Answer-Defines the cloud in terms of three service models and four deployment methods. Saas - Correct Answer-refers to applications provided for customers. For users who want the convenience of accessing their files from any location and sharing them with any location. Ex. Business people traveling from one country to another might create a security risk. Dropbox and Google docs NAAS - Correct Answer- PAAS - Correct Answer-more of a company or business model. User select a platform (the OS installed by the cloud provider) and then install their own applications or software. Iaas - Correct Answer-users get what's commonly referred to as a "bare metal" environment (using the cloud provider's equipment without having physical; access to the equipment), where they install their own Oss, applications, tools. a. International Association of Computer Investigative Specialists b. Forensics software vendors c. The International Society of Forensic Computer Examiners d. Microsoft - Correct Answer- In addition to the usual tasks of collecting and analyzing digital evidence, digital forensics consultants might be involved in which of the following activities? a. Corporate Policy making b. Offering technical advice on interrogatories c. Determining the appropriateness of law enforcement's examination d. identifying digital information that;s subject to a protective order. - Correct Answer- In which of the following circumstances is a search warrant not required to seize a digital device? a. Evidence of a crime is in plain view b. Law enforcement believes evidence could be destroyed. c. There's a constitutional expectation of privacy d. A safety risk is believed possible - Correct Answer- Digital forensics consultants are law enforcement officers. True or False? - Correct Answer- Industry standards require e-discovery consultants to have certified training in litigation database, document conversion, and trial presentation software. True or false? - Correct Answer- Which of the following is a proposed new type of consultant who would perform the actual discovery investigation instead of the plaintiff's or defendant's counsel? a. Forensics mediator b. Special master c. Coordinating attorney d. Neutral - Correct Answer- Litigation database software training is usually divided into which two levels? a. End user b. Certified examiner c. Administrator d. Special master - Correct Answer- E-discovery consultants do not testify about which of the following? a. computer user activity b. Deduping methods c. Keyword search methods d. Accuracy of search results. - Correct Answer- Which of the follwing consists of written question submitted for the purpose of gathering discovery along with written answers to these questions? a. Requests for admission b. Interrogatories c. Requests for production d. Depositions - Correct Answer- Deputy Attorney General David W. Ogden's memo identifies the role of a(n)______________________ for each U.S. Attorney's office. - Correct Answer- According to the American Bar Association, when outsourcing legal services, the service provider is responsible for the results. True or False? - Correct Answer- true or false - Correct Answer-A court- appointed e-discovery neutral must be former judge or lawyer. True or false? a, b, c, d - Correct Answer-E-discovery best practices for civil case management should include which of the following? a. Litigation software training b. Powerful workstations c. Tracking costs with the UTBMS d. Being able to sue the data collection company Which of the following is responsible for reviewing data and determining what's relevant? a. Forensics examiner b. Custodian c. Client d. Attorney - Correct Answer-Which of the following is responsible for reviewing data and determining what's relevant? a. Forensics examiner b. Custodian c. Client d. Attorney Effective communication between ___________ and ____________ can reduce the number of e-discovery requests that are unlikely to produce relevant results. a. Attorneys, courts b. Litigants, IT personnel c. Attorneys, software vendors d. Attorneys, arbitrators - Correct Answer-Effective communication between ___________ and ____________ can reduce the number of e-discovery requests that are unlikely to produce relevant results. a. Attorneys, courts b. Litigants, IT personnel c. Attorneys, software vendors d. Attorneys, arbitrators A digital has is created by using a mathematical formula that translates a file into a unique_______________ code value. a. Binary b. Electronic c. Hexadecimal D. ASCII - Correct Answer-A digital has is created by using a mathematical formula that translates a file into a unique_______________ code value. a. Binary b. Electronic c. Hexadecimal D. ASCII A chain-of-custody form documents the route evidence takes from the time it's collected until the case is closed is closed or goes to court. True of False? - Correct Answer-A chain-of-custody form documents the route evidence takes from the time it's collected until the case is closed is closed or goes to court. True of False? a - Correct Answer-Which of the following functions is one that digital forensics tools perform? a. acquisition and searching b. Validation and discrimination c. Indexing and discrimination d. Deleting and printing False - Correct Answer-Broad discovery scopes specify the types of information, data, persons, and components to be collected from or searched. True or False? b. Used by a private company c. Used by the government or a financial institution for interstate communication d. Used by anyone for interstate communication - Correct Answer- Which of the following requires publicly held companies to publish financial records and any major changes promptly? a. The Sarbanes-Oaxley Act b. The Gramm-Leach- Bililey Act c. FIRAC d. CFAA - Correct Answer- A person's medical records are protected under which of the following? a. CFAA b.HIPPA c.The Gramm-Leach-Bliley Act d. IDRM - Correct Answer- In dealing with metadata, which of the following items might be found in OS metadata? a. Structural map b. Creation date c. User behavior d. Login history - Correct Answer- Propritary information is excluded in which EDRM stage? a. Assessment b. Review c. Presentation d. output - Correct Answer- The Enron bankruptcy case was a major for in creating the Sarbanes-Oaxley Act. True or False? - Correct Answer-True The Sarbanes-Oaxley Act was enacted to protect investors and preserve corporate data. True or false? - Correct Answer- The Sedona Principles link closely to which of the following? a. Amendments to the U.S. Constitution b. FRCP c. Bill of Rights d. U.S. Constitution - Correct Answer-b if the responding party in a lawsuit considers the retrieval of requested information to be excessive, the requesting party can do which of the following? a. File an additional lawsuit b. File an injunction c. File a petition to have the responding party prove that producing the requested information would be costly and unreasonable d. File for cause - Correct Answer- In Canada, all ESI is considered "discoverable" . True or False? - Correct Answer-true Metadata can help in determining which of the following? a. Type of camera used to take a picture b. Contents of a letter c. Relationship between parties d. Position held by parties to a lawsuit - Correct Answer-a