RELATIVITY DATA BREACH RESPONSE
PRO EXAM GUIDE QUESTIONS WITH
COMPLETE ANSWERS
How much can review time be reduced, on average, when leveraging AI in Data Breach
Response? - ANSWER-50%
How long does it take, on average, to produce an initial assessment of personal
information found within a data set? - ANSWER-2-3 days
What are the two reports that can be used to QC entity results? - ANSWER-Merge
reason table and Unlinked PI Log.
What should you do after resolving conflicts generated by the automatic entity
normalization process? - ANSWER-Rerun the deduplicate individuals and report
generation Incorporate Feedback stages to record your changes and generate an
updated version of the Entity Centric Report.
What is the purpose of configuring your deduplication preferences? - ANSWER-To tell
the algorithm how to deduplicate the entities found within the data set.
What information about entities is searchable with PI and Entity Search? - ANSWER-
Other names an entity is known by in the dataset.
What is the purpose of resolving conflicts within EntityClusters? - ANSWER-To perform
quality control efforts on the machine-generated list of entities with possible similarities.
What syntax can you use for a PI and Entities Search to find documents with a
breached entity? - ANSWER-CONTAINS PI
What type of Review Center queue should be used for Data Breach Response? -
ANSWER-Data breach review queue
What report can you use to resolve a conflict within a cluster if there are two people with
the same name but differing social security numbers? - ANSWER-Deduplicate and
Normalize Entities table.
In which situation would the Unlinked PI Log be most useful? - ANSWER-To identify all
personal information that has not yet been linked to an entity in the dataset.
What is the purpose of the final Entity Centric Report in a data breach? - ANSWER-It
demonstrates how many documents in the data set contain personal information and
which documents are likely to contain entities who need notified.
PRO EXAM GUIDE QUESTIONS WITH
COMPLETE ANSWERS
How much can review time be reduced, on average, when leveraging AI in Data Breach
Response? - ANSWER-50%
How long does it take, on average, to produce an initial assessment of personal
information found within a data set? - ANSWER-2-3 days
What are the two reports that can be used to QC entity results? - ANSWER-Merge
reason table and Unlinked PI Log.
What should you do after resolving conflicts generated by the automatic entity
normalization process? - ANSWER-Rerun the deduplicate individuals and report
generation Incorporate Feedback stages to record your changes and generate an
updated version of the Entity Centric Report.
What is the purpose of configuring your deduplication preferences? - ANSWER-To tell
the algorithm how to deduplicate the entities found within the data set.
What information about entities is searchable with PI and Entity Search? - ANSWER-
Other names an entity is known by in the dataset.
What is the purpose of resolving conflicts within EntityClusters? - ANSWER-To perform
quality control efforts on the machine-generated list of entities with possible similarities.
What syntax can you use for a PI and Entities Search to find documents with a
breached entity? - ANSWER-CONTAINS PI
What type of Review Center queue should be used for Data Breach Response? -
ANSWER-Data breach review queue
What report can you use to resolve a conflict within a cluster if there are two people with
the same name but differing social security numbers? - ANSWER-Deduplicate and
Normalize Entities table.
In which situation would the Unlinked PI Log be most useful? - ANSWER-To identify all
personal information that has not yet been linked to an entity in the dataset.
What is the purpose of the final Entity Centric Report in a data breach? - ANSWER-It
demonstrates how many documents in the data set contain personal information and
which documents are likely to contain entities who need notified.