Exam 1: Introduction to E-Discovery and Digital Evidence

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In which computer and networking model are client software, data, and computing resources hosted remotely, so client computers and servers don't need to support as many on-site resources?

(Multiple Choice)
4.9/5
(43)

What is a difference between e-discovery and digital forensics?

(Essay)
4.9/5
(38)

Which of the following is NOT a service model defined by NIST?

(Multiple Choice)
4.8/5
(31)

Cloud computing is a model in which computing resources are hosted remotely.

(True/False)
4.7/5
(40)
Match each item with the description below.
Premises:
any information stored electronically or in a digital format
Responses:
MAC times
digital forensics
e-discovery
Correct Answer:
Verified
Premises:
Responses:
any information stored electronically or in a digital format
MAC times
(Matching)
4.8/5
(33)

Which Federal Rule of Evidence is relevant to the admissibility of e-mail messages?

(Multiple Choice)
4.7/5
(36)

What is the importance of chain of custody?

(Essay)
4.8/5
(39)

Which cloud deployment method is considered the most secure?

(Multiple Choice)
5.0/5
(45)

With a __________ cloud, a person's files are on the same physical machine as another person's or organization's files.

(Short Answer)
4.8/5
(38)

The process of retrieving evidence from the data of an encrypted hard drive would be considered the job of which of the following?

(Multiple Choice)
4.8/5
(38)

E-discovery is the use of advanced electronic surveillance to catch criminals in the act.

(True/False)
4.8/5
(40)

The Sedona Canada principles and the Ontario checklist for preparing a discovery plan are part of Canadian procedural law.

(True/False)
4.9/5
(32)

With which service model do customers select an OS and install their own applications?

(Multiple Choice)
4.8/5
(35)

Which of the following is NOT a cloud deployment method defined by NIST?

(Multiple Choice)
4.7/5
(38)
Match each item with the description below.
Premises:
a method used to gather information about customers or vendors by culling ESI
Responses:
MAC times
data mining
chain of custody
Correct Answer:
Verified
Premises:
Responses:
a method used to gather information about customers or vendors by culling ESI
MAC times
(Matching)
4.8/5
(37)

How does the cloud affect e-discovery?

(Essay)
4.9/5
(36)

E-Discovery can be thought of as data _________ to gather information for use in legal proceedings.

(Short Answer)
4.8/5
(41)

Which set of rules was established in 1938 for resolving issues or legal matters in civil cases at the federal level?

(Multiple Choice)
4.8/5
(47)
Match each item with the description below.
Premises:
a software method of scanning a picture and converting the characters to text
Responses:
MAC times
data mining
digital evidence
Correct Answer:
Verified
Premises:
Responses:
a software method of scanning a picture and converting the characters to text
MAC times
(Matching)
4.8/5
(41)

Discuss the difference between data and metadata providing examples.

(Essay)
4.9/5
(43)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)