Question
1)Which of the following happened during the mid-1980s? companies began using mainframes the Internet backbone was developed government made use of the ARPANET the U.S.
1)Which of the following happened during the mid-1980s?
companies began using mainframes | |
the Internet backbone was developed | |
government made use of the ARPANET | |
the U.S. PATRIOT Act was passed |
2)Which of the following allows prosecution if the victim and perpetrator are in the same state and allows victims to seek restitution?
Computer Fraud and Abuse Act | |
Counterfeit Access Device and Abuse Act | |
Identity Theft Enforcement and Restitution Act | |
U.S. PATRIOT Act |
3) Which of the following best describes a "protected computer" as defined by the CFAA?
one with passwords installed and a properly configured firewall | |
one kept in a properly secured room | |
one with adequate security controls installed | |
one used by a financial institution for commerce or communication |
4)What was developed during the 1970s to make exchanging information electronically easier?
EDI | |
VANs | |
ISPs | |
ESI |
5)Which act requires patients to be notified when their medical records are shared with third parties?
HIPAA | |
Sarbanes-Oxley | |
UN/EDIFACT | |
METS |
6)Which of the following is true about data and metadata?
OS metadata is most important in civil cases | |
the content of documents in civil cases is more important than the metadata | |
document metadata is never captured in civil cases | |
OS metadata stores information such as a documents author |
7)Which of the following is a term used to describe work done by an attorney to help those that cant afford their services?
Question 7 options:
non gratis | |
Exculpatory | |
per diem | |
pro bono |
8)What does eDiscovery tend to focus on in criminal cases compared to civil cases?
digital forensics | |
data organization | |
document requests | |
organic evidence |
9)What legal instrument is usually bypassed in civil eDiscovery that is required for discovery in criminal cases?
document metadata | |
search warrant | |
FRCP rules | |
legal counsel |
10)Which of the following is a method devised for handling an overwhelming amount of electronic evidence that attorneys must deal with?
CFAA | |
EDRM | |
HIPAA | |
METS |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started