Exam 6: The Cloud and Social Media

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

SaaS applications are stored on the user's computer.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

False

Which state prohibits virtual law firms?

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

D

Many security breaches are the result of:

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

A

Only tangible items are subject to spoliation.

(True/False)
4.8/5
(28)

Social media can be admitted into evidence if it is properly authenticated.

(True/False)
4.9/5
(34)

Which of the following is NOT an essential element of cloud computing?

(Multiple Choice)
4.9/5
(35)

Rapid elasticity refers to the speed of the connection to the cloud.

(True/False)
4.9/5
(41)

Posts to a friend's Facebook page are a form of social media.

(True/False)
4.8/5
(26)

Information found on social media is always discoverable.

(True/False)
4.7/5
(42)

The Stored Communications Act governs the storage of phone records.

(True/False)
4.8/5
(34)

An online ransom is paid in:

(Multiple Choice)
4.9/5
(43)

Which of the following is NOT a proper acronym used when referring to the Stored Communications Act?

(Multiple Choice)
4.9/5
(26)

Legal professionals must use reasonable care when entrusting confidential client information to a third party on the cloud.

(True/False)
4.8/5
(33)

Which of the following is NOT a means of enabling geolocation?

(Multiple Choice)
4.9/5
(38)

Geolocation requires access to the Internet to be effective.

(True/False)
4.9/5
(38)

The Stored Communications Act provides Fourth Amendment protection to information stored in the cloud.

(True/False)
4.9/5
(32)

Which of the following are steps that a law firm can take to protect confidential client information?

(Multiple Choice)
4.8/5
(28)

A "click-through" on a website is a device that requires a user to agree to certain terms and conditions before submitting information.

(True/False)
4.9/5
(28)

Which of the following is not true of encryption?

(Multiple Choice)
4.9/5
(25)

Which method requires no fancy technology to secure documents?

(Multiple Choice)
5.0/5
(35)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)