Deck 6: The Cloud and Social Media

Full screen (f)
exit full mode
Question
Which of the following is not true of encryption?

A)It can be used when the data is at rest.
B)It can be used when the data is in motion.
C)It can be used to secure a single document only.
D)It cannot be used on a hard drive.
E)It requires a key to unlock.
Use Space or
up arrow
down arrow
to flip the card.
Question
Rapid elasticity refers to the speed of the connection to the cloud.
Question
SaaS applications are stored on the user's computer.
Question
Geotagging refers to the geographical information included in a files metadata.
Question
Geolocation requires access to the Internet to be effective.
Question
Posts to a friend's Facebook page are a form of social media.
Question
Access to the cloud requires access to the Internet.
Question
Only tangible items are subject to spoliation.
Question
Which of the following is NOT an essential element of cloud computing?

A)On-demand self-service
B)Broad network access
C)Rapid elasticity
D)Use of a "click-through"
Question
EXIF data refers to the external information created by geolocation.
Question
A "click-through" on a website is a device that requires a user to agree to certain terms and conditions before submitting information.
Question
Text messages are a form of social media.
Question
Social media can be admitted into evidence if it is properly authenticated.
Question
Which of the following is NOT a means of enabling geolocation?

A)GPS
B)Cell-tower pings
C)Wi-Fi
D)All of these are correct.
Question
Which of the following is NOT a form of social media?

A)Facebook
B)Match.com (dating service)
C)Westlaw
D)Twitter
Question
The Stored Communications Act governs the storage of phone records.
Question
Information found on social media is always discoverable.
Question
Which of the following is NOT a proper acronym used when referring to the Stored Communications Act?

A)SCA
B)WWW
C)RCS
D)ECS
Question
Legal professionals must use reasonable care when entrusting confidential client information to a third party on the cloud.
Question
The Stored Communications Act provides Fourth Amendment protection to information stored in the cloud.
Question
An online ransom is paid in:

A)Dollars
B)Euros
C)Bitcoins
D)Rupees
E)Pesos
Question
Which method requires no fancy technology to secure documents?

A)Spear phishing
B)Biometrics
C)Two-factor authorization
D)A password
E)Bluetooth
Question
Which state prohibits virtual law firms?

A)Maryland
B)Wisconsin
C)Florida
D)Colorado
E)Maine
Question
Many security breaches are the result of:

A)stolen computers
B)encrypted thumb drives
C)using tablets
D)incomplete passwords
E)email messages
Question
Which of the following are steps that a law firm can take to protect confidential client information?

A)Enable the built-in encryption feature available in many mobile devices.
B)Encrypt specific documents containing confidential client data.
C)Encrypt the hard drive on the computer.
D)Encrypt the office Wi-Fi.
E)All of these are correct.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: The Cloud and Social Media
1
Which of the following is not true of encryption?

A)It can be used when the data is at rest.
B)It can be used when the data is in motion.
C)It can be used to secure a single document only.
D)It cannot be used on a hard drive.
E)It requires a key to unlock.
D
2
Rapid elasticity refers to the speed of the connection to the cloud.
False
3
SaaS applications are stored on the user's computer.
False
4
Geotagging refers to the geographical information included in a files metadata.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Geolocation requires access to the Internet to be effective.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Posts to a friend's Facebook page are a form of social media.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Access to the cloud requires access to the Internet.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Only tangible items are subject to spoliation.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is NOT an essential element of cloud computing?

A)On-demand self-service
B)Broad network access
C)Rapid elasticity
D)Use of a "click-through"
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
EXIF data refers to the external information created by geolocation.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
A "click-through" on a website is a device that requires a user to agree to certain terms and conditions before submitting information.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
Text messages are a form of social media.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Social media can be admitted into evidence if it is properly authenticated.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is NOT a means of enabling geolocation?

A)GPS
B)Cell-tower pings
C)Wi-Fi
D)All of these are correct.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is NOT a form of social media?

A)Facebook
B)Match.com (dating service)
C)Westlaw
D)Twitter
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
The Stored Communications Act governs the storage of phone records.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Information found on social media is always discoverable.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is NOT a proper acronym used when referring to the Stored Communications Act?

A)SCA
B)WWW
C)RCS
D)ECS
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Legal professionals must use reasonable care when entrusting confidential client information to a third party on the cloud.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
The Stored Communications Act provides Fourth Amendment protection to information stored in the cloud.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
An online ransom is paid in:

A)Dollars
B)Euros
C)Bitcoins
D)Rupees
E)Pesos
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Which method requires no fancy technology to secure documents?

A)Spear phishing
B)Biometrics
C)Two-factor authorization
D)A password
E)Bluetooth
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Which state prohibits virtual law firms?

A)Maryland
B)Wisconsin
C)Florida
D)Colorado
E)Maine
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Many security breaches are the result of:

A)stolen computers
B)encrypted thumb drives
C)using tablets
D)incomplete passwords
E)email messages
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following are steps that a law firm can take to protect confidential client information?

A)Enable the built-in encryption feature available in many mobile devices.
B)Encrypt specific documents containing confidential client data.
C)Encrypt the hard drive on the computer.
D)Encrypt the office Wi-Fi.
E)All of these are correct.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.