Exam 1: Introduction to E-Discovery and Digital Evidence
Exam 1: Introduction to E-Discovery and Digital Evidence50 Questions
Exam 2: A Brief History of E-Discovery50 Questions
Exam 3: E-Discovery Planning Tools50 Questions
Exam 4: Experts: The Right Person for the Right Job50 Questions
Exam 5: Digital Evidence Case Flow50 Questions
Exam 6: Case Study From Beginning to Trial50 Questions
Exam 7: Information Governance and Litigation Preparedness50 Questions
Exam 8: Researching E-Discovery Case Law50 Questions
Exam 9: The Future of E-Discovery50 Questions
Select questions type
In which computer and networking model are client software, data, and computing resources hosted remotely, so client computers and servers don't need to support as many on-site resources?
(Multiple Choice)
4.9/5
(43)
Which of the following is NOT a service model defined by NIST?
(Multiple Choice)
4.8/5
(31)
Cloud computing is a model in which computing resources are hosted remotely.
(True/False)
4.7/5
(40)
Match each item with the description below.
Premises:
any information stored electronically or in a digital format
Responses:
MAC times
digital forensics
e-discovery
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(33)
Which Federal Rule of Evidence is relevant to the admissibility of e-mail messages?
(Multiple Choice)
4.7/5
(36)
Which cloud deployment method is considered the most secure?
(Multiple Choice)
5.0/5
(45)
With a __________ cloud, a person's files are on the same physical machine as another person's or organization's files.
(Short Answer)
4.8/5
(38)
The process of retrieving evidence from the data of an encrypted hard drive would be considered the job of which of the following?
(Multiple Choice)
4.8/5
(38)
E-discovery is the use of advanced electronic surveillance to catch criminals in the act.
(True/False)
4.8/5
(40)
The Sedona Canada principles and the Ontario checklist for preparing a discovery plan are part of Canadian procedural law.
(True/False)
4.9/5
(32)
With which service model do customers select an OS and install their own applications?
(Multiple Choice)
4.8/5
(35)
Which of the following is NOT a cloud deployment method defined by NIST?
(Multiple Choice)
4.7/5
(38)
Match each item with the description below.
Premises:
a method used to gather information about customers or vendors by culling ESI
Responses:
MAC times
data mining
chain of custody
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(37)
E-Discovery can be thought of as data _________ to gather information for use in legal proceedings.
(Short Answer)
4.8/5
(41)
Which set of rules was established in 1938 for resolving issues or legal matters in civil cases at the federal level?
(Multiple Choice)
4.8/5
(47)
Match each item with the description below.
Premises:
a software method of scanning a picture and converting the characters to text
Responses:
MAC times
data mining
digital evidence
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(41)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)