RELATIVITY DATA BREACH RESPONSE
EXAM QUESTIONS AND ANSWERS
.
How does Data Breach Response expedite manual deduplication efforts while still
providing transparency into the process, leading to faster and cleaner generation of
entity reports? - ANSWER-Through automatic deduplication of personal information.
What is an advantage of Data Breach Response compared to other solutions? -
ANSWER-Its a purpose-built data breach application in Relativity One.
What is Data Breach Response? - ANSWER-An AI-powered solution used to reduce
the time, cost, and risk to produce an entity notification list.
What unit is billed for Data Breach Response? - ANSWER-Gigabytes of data in Data
Breach Response per month.
How can you provide Relativity One users access to Data Breach Response? -
ANSWER-Add them to a group that has the correct permissions set.
What must you provide to analyze documents in Data Breach Response? - ANSWER-A
saved search with documents to ingest.
What tools does Data Breach Response leverage for personal information
identification? - ANSWER-Pre-built AI and ML models to find pre-determined PI types.
How does Data Breach Response link personal information (PI) for structured and
unstructured documents? - ANSWER-PI is automatically linked for structured
documents and manually linked for unstructured documents
EXAM QUESTIONS AND ANSWERS
.
How does Data Breach Response expedite manual deduplication efforts while still
providing transparency into the process, leading to faster and cleaner generation of
entity reports? - ANSWER-Through automatic deduplication of personal information.
What is an advantage of Data Breach Response compared to other solutions? -
ANSWER-Its a purpose-built data breach application in Relativity One.
What is Data Breach Response? - ANSWER-An AI-powered solution used to reduce
the time, cost, and risk to produce an entity notification list.
What unit is billed for Data Breach Response? - ANSWER-Gigabytes of data in Data
Breach Response per month.
How can you provide Relativity One users access to Data Breach Response? -
ANSWER-Add them to a group that has the correct permissions set.
What must you provide to analyze documents in Data Breach Response? - ANSWER-A
saved search with documents to ingest.
What tools does Data Breach Response leverage for personal information
identification? - ANSWER-Pre-built AI and ML models to find pre-determined PI types.
How does Data Breach Response link personal information (PI) for structured and
unstructured documents? - ANSWER-PI is automatically linked for structured
documents and manually linked for unstructured documents