E-DISCOVERY TEST EXAM QUESTION
WITH COMPLETE ANSWERS
value-added networks are _____ - ANSWER-third-party service providers, similar to
ISPs, created for transferring EDI documents between companies
the EDI format for over 40 years - ANSWER-ANSI X12
UN/EDIFACT - ANSWER-United Nations/Electronic Data Interchange for
Administration, Commerce, and Transport
What is UN/EDIFACT? - ANSWER-a collection of international guidelines for
exchanging electronic info between info systems
two laws that require companies to keep accurate track of electronic documents -
ANSWER-1. Sarbanes-Oxley Act
2. Health Insurance Portability and Accountability Act
HIPAA - ANSWER-Health Insurance Portability and Accountability Act
Sarbanes-Oxley requirements - ANSWER-1. publicly held corps hold onto email for 5
years
2. turn over data when requested by courts
HIPAA of 2001 requirements - ANSWER-1. protects a patient's medical history
2. specifies other privacy rights
HIPAA was drafted by - ANSWER-US Department of Health and Human Services
Year the first discussion in a major law journal of e-discovery being used in civil litigation
appeared in - ANSWER-1997
Year of the Enron bankruptcy and when e-discovery became a popular topic in civil
litigation discussions and articles - ANSWER-2001
metadata - ANSWER-data about data
ESI - ANSWER-considered a digital library of sorts
the standard used for objects in a digital library - ANSWER-Metadata Encoding
Transmission Standard (METS)
METS - ANSWER-Transmission Standard
, The standard used for objects in a digital library were developed by _____ and
maintained by _______ - ANSWER-Digital Library Association
Library of Congress
METS have ____ categories of metadata in digital documents or books - ANSWER-5
The five categories’ METS has in categories of metadata in digital documents or books
are: - ANSWER-1. Descriptive metadata
2. Administrative metadata
3. File groups
4. Structural map
5. Behavior
The three terms associated with ways of storing and retrieving electronic documents. -
ANSWER-1. descriptive
2. administrative
3. structural
The category of metadata that lists metadata embedded in the document or external
descriptive metadata stored on an Internet server. - ANSWER-Descriptive metadata
The category of metadata that describes how a document was created and stored, the
original source object, and intellectual property rights - ANSWER-Administrative
metadata
Year the CFAA was adopted by Congress as an amendment to the 1984 vaguely
worded and limited scope Act - ANSWER-1986
The CFAA was created as a ________ - ANSWER-criminal statute that is referenced as
18 USC 1030
Year the National Information Infrastructure Protection Act was added to the CFAA to
cover extortion that threatens harm to a protected computer. - ANSWER-1996
Years the US PATRIOT Act made additional changes to the CFAA - ANSWER-2001
and 2006
Year the Identity Theft Enforcement and Restitution Act was passed to amend the
CFAA to allow prosecution if the victim and perpetrator are in the same state -
ANSWER-2008
Most mainframes could be accessed by what two protocols - ANSWER-Telnet or FTP
services
CERT - ANSWER-Computer Emergency and Response Team
WITH COMPLETE ANSWERS
value-added networks are _____ - ANSWER-third-party service providers, similar to
ISPs, created for transferring EDI documents between companies
the EDI format for over 40 years - ANSWER-ANSI X12
UN/EDIFACT - ANSWER-United Nations/Electronic Data Interchange for
Administration, Commerce, and Transport
What is UN/EDIFACT? - ANSWER-a collection of international guidelines for
exchanging electronic info between info systems
two laws that require companies to keep accurate track of electronic documents -
ANSWER-1. Sarbanes-Oxley Act
2. Health Insurance Portability and Accountability Act
HIPAA - ANSWER-Health Insurance Portability and Accountability Act
Sarbanes-Oxley requirements - ANSWER-1. publicly held corps hold onto email for 5
years
2. turn over data when requested by courts
HIPAA of 2001 requirements - ANSWER-1. protects a patient's medical history
2. specifies other privacy rights
HIPAA was drafted by - ANSWER-US Department of Health and Human Services
Year the first discussion in a major law journal of e-discovery being used in civil litigation
appeared in - ANSWER-1997
Year of the Enron bankruptcy and when e-discovery became a popular topic in civil
litigation discussions and articles - ANSWER-2001
metadata - ANSWER-data about data
ESI - ANSWER-considered a digital library of sorts
the standard used for objects in a digital library - ANSWER-Metadata Encoding
Transmission Standard (METS)
METS - ANSWER-Transmission Standard
, The standard used for objects in a digital library were developed by _____ and
maintained by _______ - ANSWER-Digital Library Association
Library of Congress
METS have ____ categories of metadata in digital documents or books - ANSWER-5
The five categories’ METS has in categories of metadata in digital documents or books
are: - ANSWER-1. Descriptive metadata
2. Administrative metadata
3. File groups
4. Structural map
5. Behavior
The three terms associated with ways of storing and retrieving electronic documents. -
ANSWER-1. descriptive
2. administrative
3. structural
The category of metadata that lists metadata embedded in the document or external
descriptive metadata stored on an Internet server. - ANSWER-Descriptive metadata
The category of metadata that describes how a document was created and stored, the
original source object, and intellectual property rights - ANSWER-Administrative
metadata
Year the CFAA was adopted by Congress as an amendment to the 1984 vaguely
worded and limited scope Act - ANSWER-1986
The CFAA was created as a ________ - ANSWER-criminal statute that is referenced as
18 USC 1030
Year the National Information Infrastructure Protection Act was added to the CFAA to
cover extortion that threatens harm to a protected computer. - ANSWER-1996
Years the US PATRIOT Act made additional changes to the CFAA - ANSWER-2001
and 2006
Year the Identity Theft Enforcement and Restitution Act was passed to amend the
CFAA to allow prosecution if the victim and perpetrator are in the same state -
ANSWER-2008
Most mainframes could be accessed by what two protocols - ANSWER-Telnet or FTP
services
CERT - ANSWER-Computer Emergency and Response Team