Reference no: EM132531033
1. Legal functions are the most important area of IG impact. Under the FRCP amendments, corporations must proactively manage the e-discovery process to avoid what?
A. a loss of public trust
B. unfavorable rulings
C. Sanctions,
D. All of the above
2. The implementation of an LHN program attacks some of the low-hanging fruit within an or an organization's overall IG position. This part of the e-discovery life-cycle must not be outsourced. Why is this the case?
A. Retained counsel does not provide input or the mechanics of the LHN don't need to manage and owned by the internal corporate resources
B. Both A and C
C. No internal ownership is required by the counsel's engagement in this situation
D. Retained counsel provides input, but the mechanics of the LHN must be managed and owned by the internal corporate resources
3. The ...............................is a visual planning tool created by EDRM.net to assist in identifying and clarifying the stages of the e-discovery process?
A. E-Discovery Reference Model
B. None of the above
C. Information Management Protocol
D. Guidelines for E-Discovery Planning
4. According to recent surveys regarding Big Data and its impacts, approximately 25................... percent of information stored in organizations has real business value, while 5................ percent must be kept as business records and about 1............... percent is retained due to a litigation hold.
A. 25, 5, 1
B. None of the above
C. 25, 5, 2
D. 1, 5, 25
5. What is ISO 38500? ........................................... that provides high-level principles and guidance for senior decision-makers
A. International Organization Law
B. European and American Standard Procedure
C. International standard
D. International Metric
6. Principles of IG are on the evolutionary edge, and therefore, most successful IG programs have been characterized by ten key principles which have become the .............................................and should be designed into the IG approach.
A. Design
B. basis for best practices
C. Both A and B
D. Basic foundation
7. Principles of IG are on the evolutionary edge, and therefore, most successful IG programs have been characterized by ................................. key principles which have become the basis for best practices and should be designed into the IG approach.
A. Ten
B. Eleven
C. None of the above
D. Five
8. What is the ITIL?
A. Focuses on value delivery
B. All of the above.
C. A group of metrics that govern the program
D. A set of process-oriented best practices
9. The principles of successful IG programs are emerging, and they include executive sponsorship, and.................., .................., .................., ..............., ..............., ............, ............, .................., and ...............?
A. Information classification, integrity, security, accessibility, control, monitoring, auditing, policy development, and continuous metrics
B. A and B
C. Information classification, integrity, security, personally identifiable information, control, monitoring, auditing, policy development, and continuous improvement
D. Information classification, integrity, security, accessibility, control, monitoring, auditing, policy development, and continuous improvement
10. Generally Accepted Recordkeeping Principles are sometimes known as the .............................?
A. The ARMA Principles
B. The IG Principles
C. None of the above
D. The GAR Principles
11. Risk Profile creation is a basic building block in the Enterprise Risk Management to assist executives to understand the risks associated with?
A. Stated Business Agreements
B. Stated Business Objectives
C. Both A, B, and C
D. Stated Business Goals
12. According to the best business practices associated with and approved by IG Subject Matter experts, there are three (3) key Event-Based prerequisites that must be completed before an event-based disposition can be implemented. These prerequisites are?
A. The ERM Systems must have complete retention and disposition capabilities, A clear start date is a required, Clarify trigger events
B. Clarify trigger events, an aautomated capture of agreed-on trigger events must be performed and sent to the ERM, The ERM Systems must have complete retention and disposition capabilities
C. A clear start date is a required, Retention periods must be segmented into active and inactive, Clarify trigger events
D. None of the above
13. Which one of the following is TRUE about the IG Reference Model?
A. Linking duty + value to information asset = efficient, effective management
B. All of the above
C. Linking duty + policy integration = efficient, effective management
D. Linking duty + value to information asset = Unified governance, effective management
14. ..........is a process-based IT governance framework that represents a consensus of experts worldwide.
A. CobiTL
B. CobiT
C. All of the above
D. CobiTX
15. IG is sort of a super discipline that encompasses a variety of key concepts from a variety of ....................................?
A. Isolated discipline but comprehensive
B. All of the above.
C. Related and overlapping disciplines
D. Never overlapping disciplines
16. Predictive coding software leverages ............................. when experts review a subset of documents to teach the software what to look for, so it can apply this logic to the full set of .........................?
A. Pattern search, intelligence
B. Human analysis, pages
C. Human analysis, documents
D. Human Intelligence, documents
17. TRUE or FALSE: Unknown or useless data, such as old log files that take up space and continues to grow and requires regular clean-up is sometimes known as dark data
True
False
18. TRUE or FALSE: Clean, build and maintain, Survey and monetize are the 3 phases in the Yard's rebirth.
True
False
19. TRUE or FALSE: Clean, build and maintain, and monetize are the 3 phases in the Yard's rebirth
True
False
20. TRUE or FALSE: Good data governance ensures that downstream negative effects of poor data are avoided and that subsequent reports, analyses, and conclusions are based on reliable, and trusted data.
True
False
21. TRUE or FALSE: According to the Intersection of IG and E-Discovery, the Legal Hold Process is NOT a foundational element of Information Governance (IG).
True
False
22. Creating a ........................ is a basic building block in an ..................... that assists business executives understand the risks associated with stated business objectives.
A. Risk Profile, Framework
B. All of the above
C. ISO 9000, Heatmap
D. Risk profile, Enterprise Risk Management
23. What's the fundamental function of the GAR Principle?
A. None of the above
B. Generally Accepted Recordkeeping principles is used to measure program profits
C. Foster awareness of good record-keeping practices, and provides associated metrics to provide an IG framework to support continuous improvement
D. To deploy Gastric Analysis Revenue
24. One of the ten IG principles is a Continuous improvement. What is the importance of this principle to the organization program?
A. Ensure guidelines and policies are being followed to measure employee compliance
B. Provide periodic program review and necessary adjustment against gaps and or shortcomings
C. Document management and report management software must be deployed for control
D. None of the above
25. From our Chapter 9; - Records Management (RM) is a key impact area of IG - so much that in the RM space, IG is often thought of as synonymous with or a single superset of RM. From that perspective, the International Organization for Standardization (ISO) defined business records as..............................................?
A. Both A and B
B. information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations
C. information created, received, and maintained as evidence and information by an organization in pursuance of legal obligations.
D. information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations or in the transaction in the form of Files.