Deck 1: Introduction to E-Discovery and Digital Evidence
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Match between columns
Question
Match between columns
Question
Question
Match between columns
Question
Match between columns
Question
Match between columns
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Question
Question
Match between columns
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 1: Introduction to E-Discovery and Digital Evidence
1
Metadata is a legal term that refers to the actual information being retrieved.
False
2
Which of the following is NOT a service model defined by NIST?
A) SaaS
B) PaaS
C) IaaS
D) NaaS
A) SaaS
B) PaaS
C) IaaS
D) NaaS
D
3
Cloud computing is a model in which computing resources are hosted remotely.
True
4
Which of the following is an example of metadata?
A) a paragraph in a printed document
B) words in an electronic document
C) GPS data for a photo
D) DNA extracted from blood
A) a paragraph in a printed document
B) words in an electronic document
C) GPS data for a photo
D) DNA extracted from blood
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Where should you look if you want to find what camera was used to take a photograph?
A) on the back of the photo file
B) in the EXIF header
C) on a hardcopy of the photo
D) in the jpg pixels
A) on the back of the photo file
B) in the EXIF header
C) on a hardcopy of the photo
D) in the jpg pixels
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is NOT true about digital evidence?
A) it can pertain to a civil or criminal complaint
B) it is only found on desktop computers
C) it must be acquired by following specific procedures
D) e-mail is an example
A) it can pertain to a civil or criminal complaint
B) it is only found on desktop computers
C) it must be acquired by following specific procedures
D) e-mail is an example
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
E-discovery is the use of advanced electronic surveillance to catch criminals in the act.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
In which computer and networking model are client software, data, and computing resources hosted remotely, so client computers and servers don't need to support as many on-site resources?
A) WAN network
B) Internetwork model
C) Cloud computing
D) Mainframe processing
A) WAN network
B) Internetwork model
C) Cloud computing
D) Mainframe processing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The Sedona Canada principles and the Ontario checklist for preparing a discovery plan are part of Canadian procedural law.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
What must be followed to ensure that evidence has not been tampered with or altered?
A) search warrants
B) chain of custody
C) subpoenas
D) requests for production
A) search warrants
B) chain of custody
C) subpoenas
D) requests for production
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which cloud deployment method is considered the most secure?
A) public
B) hybrid
C) internal
D) private
A) public
B) hybrid
C) internal
D) private
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is true about digital forensics?
A) device forensics focuses on network intrusion
B) a MAC time tells a digital forensics expert the hardware address of a computer
C) network forensics experts consider e-discovery a part of their job
D) e-discovery can be considered a subset of digital forensics
A) device forensics focuses on network intrusion
B) a MAC time tells a digital forensics expert the hardware address of a computer
C) network forensics experts consider e-discovery a part of their job
D) e-discovery can be considered a subset of digital forensics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which set of rules was established in 1938 for resolving issues or legal matters in civil cases at the federal level?
A) FRCP
B) FRCrP
C) FRErP
D) FRE
A) FRCP
B) FRCrP
C) FRErP
D) FRE
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is true about E-discovery?
A) it can be thought of as data mining
B) it consists of hard copies of court documents
C) it does not include data found on cellular phones
D) it is valid in civil cases, but not in criminal cases
A) it can be thought of as data mining
B) it consists of hard copies of court documents
C) it does not include data found on cellular phones
D) it is valid in civil cases, but not in criminal cases
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
With which service model do customers select an OS and install their own applications?
A) SaaS
B) PaaS
C) NaaS
D) IaaS
A) SaaS
B) PaaS
C) NaaS
D) IaaS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Why might you want to use the AccessData Forensic Toolkit?
A) to view document metadata
B) to examine blood evidence
C) to listen in on cell phone transmissions
D) to capture network data
A) to view document metadata
B) to examine blood evidence
C) to listen in on cell phone transmissions
D) to capture network data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
When examining digital evidence on a device, what is used to prevent data from being copied back to the evidence item inadvertently?
A) write blocker
B) live acquisitions
C) deduplication
D) forensic imaging
A) write blocker
B) live acquisitions
C) deduplication
D) forensic imaging
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The process of retrieving evidence from the data of an encrypted hard drive would be considered the job of which of the following?
A) network forensics expert
B) e-discovery expert
C) ESI administrator
D) device forensics expert
A) network forensics expert
B) e-discovery expert
C) ESI administrator
D) device forensics expert
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is NOT a cloud deployment method defined by NIST?
A) internal
B) private
C) hybrid
D) public
A) internal
B) private
C) hybrid
D) public
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
In general, states' rules regarding ESI can be more lenient than federal rules.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Dropbox is an example of the ___________ cloud service model.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
In the context of e-discovery, ____________ evidence is called ESI.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Which set of rules applies to all evidence presented in court for both civil and criminal cases?
A) FRCP
B) FRCrP
C) FRErP
D) FRE
A) FRCP
B) FRCrP
C) FRErP
D) FRE
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What type of software can be used to index the text contained in scanned pictures of documents?
A) TIFF
B) PDF
C) OCR
D) ESI
A) TIFF
B) PDF
C) OCR
D) ESI
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following was developed as the result of burgeoning e-commerce in the 1990s, focused on civil procedures, and has been a basis for e-discovery worldwide?
A) UN Model Law
B) European Corporate Laws
C) Canadian Rules of Civil Procedure
D) Sedona Canada Principles
A) UN Model Law
B) European Corporate Laws
C) Canadian Rules of Civil Procedure
D) Sedona Canada Principles
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Replacing paper documents with electronic documents in PDF or TIFF format is an example of good ___________ management.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
E-Discovery can be thought of as data _________ to gather information for use in legal proceedings.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
With a __________ cloud, a person's files are on the same physical machine as another person's or organization's files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following were created by a group of lawyers and other professionals as guidelines for handling electronic documents?
A) Federal Rules of Evidence
B) Sedona Principles
C) Advisory Committee on Civil Rules
D) UN Model Law
A) Federal Rules of Evidence
B) Sedona Principles
C) Advisory Committee on Civil Rules
D) UN Model Law
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Which Federal Rule of Evidence is relevant to the admissibility of e-mail messages?
A) Limited Admissibility
B) Relevancy and Its Limits
C) Hearsay
D) Opinions and Expert Testimony
A) Limited Admissibility
B) Relevancy and Its Limits
C) Hearsay
D) Opinions and Expert Testimony
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match between columns
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss the difference between data and metadata providing examples.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Describe e-discovery in terms of data mining.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe software as a service (SaaS). Provide an example.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
How has the introduction of digital evidence changed the FRE, if at all?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What are the two specialties of digital forensics?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe digital evidence. What are some sources of digital evidence?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
How does the volume of information involved in a case affect the e-discovery process? How can the impact be reduced?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
What is a difference between e-discovery and digital forensics?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
How does the cloud affect e-discovery?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What is the importance of chain of custody?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck