PM Quizlet
ACEDs Practice
Save
Terms in this set (41)
A litigation support professional B
receives a native file production from
opposing counsel and
immediately imports it into the law
firm's e-discovery platform and
attempts to look at the first
document. Rather than see words on a
page, the litigation support
professional sees windows popping up
with foreign language
characters randomly displaying and
scrolling down the screen.
What key step below did the
litigation support professional most
likely miss?
Performing language detection before
review.
Scanning the native file
production for viruses prior to
importing.
Ensuring the operating system is
updated before importing.
Conducting a load file
reconciliation before review.
https://quizlet.com/1157014497/flash- 1/40
cards/?new
,3/17/26, 4:07 ACEDs Practice Flashcards |
PM Quizlet
You are in charge of litigation
B support at your law firm. Company
A, a large corporate client of the
firm, and John Smith, a member of
the client's management team, have
been named in a lawsuit alleging
theft of intellectual property
(including computer code) and
violation of a non-compete
agreement. The lawsuit stems from
Smith's departure from Company B,
a direct competitor of Company
A.
You have been tasked with
coordinating the collection of ESI
from the client, Company A.
Given the importance of the client
to the firm, the highly technical
issues involved, and the fact
that
computer code may need to
be preserved, who would be
best
suited to perform the collection of
ESI?
A) The IT manager at the client
who is certified in Microsoft
infrastructure
B)A forensic expert familiar with
ESI collection in litigation
C) An expert consultant who is
familiar with computer code
relevant to the case
D)You, as the person in
https://quizlet.com/1157014497/flash- 2/40
cards/?new
,3/17/26, 4:07 ACEDs Practice Flashcards |
PM Quizlet
A data forensic examiner is asked to B
perform an acquisition of a
computer hard drive. In addition to the
collection, he is asked to perform the
most thorough quality control (QC) of
the data.
What method of QC is likely to be most
thorough?
Verify file numbers and sizes.
Verify MD5 or SHA1 hash values.
Copy data to a working hard drive and
verify that all files function as intended.
Verify file names, date created
fields, and time created fields.
https://quizlet.com/1157014497/flash- 3/40
cards/?new
, 3/17/26, 4:07 ACEDs Practice Flashcards |
PM Quizlet
During a large-scale review D
involving many contract attorneys
performing document review, the
review center manager overseeing the
document review is concerned about
the potential for data leakage. The facts
and
circumstances of the case are sensitive,
and any leaks of documents or
information could impact a key revenue
stream and embarrass the client's
leadership. Which step below is the
most effective way the review center
manager may reduce the risk of data
leakage?
Prohibit all cell phones in the review
center.
Disable USB ports on the reviewer
workstation computers.
Limit certain reviewers' access to only
certain documents.
Have all reviewers sign an NDA
and monitor their review activities
https://quizlet.com/1157014497/flash- 4/40
cards/?new