In: Computer Science
1)Which of the following happened during the mid-1980s?
companies began using mainframes |
|
the Internet backbone was developed |
|
government made use of the ARPANET |
|
the U.S. PATRIOT Act was passed |
2)Which of the following allows prosecution if the victim and perpetrator are in the same state and allows victims to seek restitution?
Computer Fraud and Abuse Act |
|
Counterfeit Access Device and Abuse Act |
|
Identity Theft Enforcement and Restitution Act |
|
U.S. PATRIOT Act |
3) Which of the following best describes a "protected computer" as defined by the CFAA?
one with passwords installed and a properly configured firewall |
|
one kept in a properly secured room |
|
one with adequate security controls installed |
|
one used by a financial institution for commerce or communication |
4)What was developed during the 1970s to make exchanging information electronically easier?
EDI |
|
VANs |
|
ISPs |
|
ESI |
5)Which act requires patients to be notified when their medical records are shared with third parties?
HIPAA |
|
Sarbanes-Oxley |
|
UN/EDIFACT |
|
METS |
6)Which of the following is true about data and metadata?
OS metadata is most important in civil cases |
|
the content of documents in civil cases is more important than the metadata |
|
document metadata is never captured in civil cases |
|
OS metadata stores information such as a document�s author |
7)Which of the following is a term used to describe work done by an attorney to help those that can�t afford their services?
Question 7 options:
non gratis |
|
Exculpatory |
|
per diem |
|
pro bono |
8)What does eDiscovery tend to focus on in criminal cases compared to civil cases?
digital forensics |
|
data organization |
|
document requests |
|
organic evidence |
9)What legal instrument is usually bypassed in civil eDiscovery that is required for discovery in criminal cases?
document metadata |
|
search warrant |
|
FRCP rules |
|
legal counsel |
10)Which of the following is a method devised for handling an overwhelming amount of electronic evidence that attorneys must deal with?
CFAA |
|
EDRM |
|
HIPAA |
|
METS |
1) The internet backbone was developed
2) Identity Theft Enforcement and Restitution Act
3) One used by a financial institution for commerce or
communication
4) EDI - Electronic Data Interchange
5) HIPAA - Health Insurance Portability and Accountability Act.
Under HIPAA your medical data is considered confidential.
6) OS metadata stores information such as a documents author
7) pro bono
10)EDRM (electronic discovery reference model)