Legal functions are most important area of IG impact

Assignment Help Basic Computer Science
Reference no: EM132531033

1. Legal functions are the most important area of IG impact. Under the FRCP amendments, corporations must proactively manage the e-discovery process to avoid what?

A. a loss of public trust

B. unfavorable rulings

C. Sanctions,

D. All of the above

2. The implementation of an LHN program attacks some of the low-hanging fruit within an or an organization's overall IG position. This part of the e-discovery life-cycle must not be outsourced. Why is this the case?

A. Retained counsel does not provide input or the mechanics of the LHN don't need to manage and owned by the internal corporate resources

B. Both A and C

C. No internal ownership is required by the counsel's engagement in this situation

D. Retained counsel provides input, but the mechanics of the LHN must be managed and owned by the internal corporate resources

3. The ...............................is a visual planning tool created by EDRM.net to assist in identifying and clarifying the stages of the e-discovery process?

A. E-Discovery Reference Model

B. None of the above

C. Information Management Protocol

D. Guidelines for E-Discovery Planning

4. According to recent surveys regarding Big Data and its impacts, approximately 25................... percent of information stored in organizations has real business value, while 5................ percent must be kept as business records and about 1............... percent is retained due to a litigation hold.

A. 25, 5, 1

B. None of the above

C. 25, 5, 2

D. 1, 5, 25

5. What is ISO 38500? ........................................... that provides high-level principles and guidance for senior decision-makers

A. International Organization Law

B. European and American Standard Procedure

C. International standard

D. International Metric

6. Principles of IG are on the evolutionary edge, and therefore, most successful IG programs have been characterized by ten key principles which have become the .............................................and should be designed into the IG approach.

A. Design

B. basis for best practices

C. Both A and B

D. Basic foundation

7. Principles of IG are on the evolutionary edge, and therefore, most successful IG programs have been characterized by ................................. key principles which have become the basis for best practices and should be designed into the IG approach.

A. Ten

B. Eleven

C. None of the above

D. Five

8. What is the ITIL?

A. Focuses on value delivery

B. All of the above.

C. A group of metrics that govern the program

D. A set of process-oriented best practices

9. The principles of successful IG programs are emerging, and they include executive sponsorship, and.................., .................., .................., ..............., ..............., ............, ............, .................., and ...............?

A. Information classification, integrity, security, accessibility, control, monitoring, auditing, policy development, and continuous metrics

B. A and B

C. Information classification, integrity, security, personally identifiable information, control, monitoring, auditing, policy development, and continuous improvement

D. Information classification, integrity, security, accessibility, control, monitoring, auditing, policy development, and continuous improvement

10. Generally Accepted Recordkeeping Principles are sometimes known as the .............................?

A. The ARMA Principles

B. The IG Principles

C. None of the above

D. The GAR Principles

11. Risk Profile creation is a basic building block in the Enterprise Risk Management to assist executives to understand the risks associated with?

A. Stated Business Agreements

B. Stated Business Objectives

C. Both A, B, and C

D. Stated Business Goals

12. According to the best business practices associated with and approved by IG Subject Matter experts, there are three (3) key Event-Based prerequisites that must be completed before an event-based disposition can be implemented. These prerequisites are?

A. The ERM Systems must have complete retention and disposition capabilities, A clear start date is a required, Clarify trigger events

B. Clarify trigger events, an aautomated capture of agreed-on trigger events must be performed and sent to the ERM, The ERM Systems must have complete retention and disposition capabilities

C. A clear start date is a required, Retention periods must be segmented into active and inactive, Clarify trigger events

D. None of the above

13. Which one of the following is TRUE about the IG Reference Model?

A. Linking duty + value to information asset = efficient, effective management

B. All of the above

C. Linking duty + policy integration = efficient, effective management

D. Linking duty + value to information asset = Unified governance, effective management

14. ..........is a process-based IT governance framework that represents a consensus of experts worldwide.

A. CobiTL

B. CobiT

C. All of the above

D. CobiTX

15. IG is sort of a super discipline that encompasses a variety of key concepts from a variety of ....................................?

A. Isolated discipline but comprehensive

B. All of the above.

C. Related and overlapping disciplines

D. Never overlapping disciplines

16. Predictive coding software leverages ............................. when experts review a subset of documents to teach the software what to look for, so it can apply this logic to the full set of .........................?

A. Pattern search, intelligence

B. Human analysis, pages

C. Human analysis, documents

D. Human Intelligence, documents

17. TRUE or FALSE: Unknown or useless data, such as old log files that take up space and continues to grow and requires regular clean-up is sometimes known as dark data

True

False

18. TRUE or FALSE: Clean, build and maintain, Survey and monetize are the 3 phases in the Yard's rebirth.

True

False

19. TRUE or FALSE: Clean, build and maintain, and monetize are the 3 phases in the Yard's rebirth

True

False

20. TRUE or FALSE: Good data governance ensures that downstream negative effects of poor data are avoided and that subsequent reports, analyses, and conclusions are based on reliable, and trusted data.

True

False

21. TRUE or FALSE: According to the Intersection of IG and E-Discovery, the Legal Hold Process is NOT a foundational element of Information Governance (IG).

True

False

22. Creating a ........................ is a basic building block in an ..................... that assists business executives understand the risks associated with stated business objectives.

A. Risk Profile, Framework

B. All of the above

C. ISO 9000, Heatmap

D. Risk profile, Enterprise Risk Management

23. What's the fundamental function of the GAR Principle?

A. None of the above

B. Generally Accepted Recordkeeping principles is used to measure program profits

C. Foster awareness of good record-keeping practices, and provides associated metrics to provide an IG framework to support continuous improvement

D. To deploy Gastric Analysis Revenue

24. One of the ten IG principles is a Continuous improvement. What is the importance of this principle to the organization program?

A. Ensure guidelines and policies are being followed to measure employee compliance

B. Provide periodic program review and necessary adjustment against gaps and or shortcomings

C. Document management and report management software must be deployed for control

D. None of the above

25. From our Chapter 9; - Records Management (RM) is a key impact area of IG - so much that in the RM space, IG is often thought of as synonymous with or a single superset of RM. From that perspective, the International Organization for Standardization (ISO) defined business records as..............................................?

A. Both A and B

B. information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations

C. information created, received, and maintained as evidence and information by an organization in pursuance of legal obligations.

D. information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations or in the transaction in the form of Files.

Reference no: EM132531033

Questions Cloud

Infrastructure and security : The infrastructure which encompasses the network solution and security considerations is a major consideration for your company.
Compare and contrast the two protocols : Compare and contrast the two protocols. Discuss how and why each is used, then discuss how they are similar and how they differ.
Discussion centers around concept of blockchain : Discussion centers around the concept of Blockchain. There is still much confusion regarding what Blockchain is and what it is not
Bitcoins as standard form of currency : Explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.
Legal functions are most important area of IG impact : Legal functions are the most important area of IG impact. Under the FRCP amendments, corporations must proactively manage the e-discovery process to avoid what?
Discuss the benefit of penetration testing : Discuss the benefit of penetration testing. Explain what that would entail in the organization and what the team could learn from the testing.
What is the least amount xian must invest : Xian owes $10000 to the university for tuition. The annual simple interest rate is 4% and the daycount convention is ACT/365.
Estimate the required rate of return of single asset : Please explain the CAPM that estimate the required rate of return of single asset. Show the formula with the market risk premium. Also explain the beta coeffici
Barnaby fatburner gyms ltd-number of shares : What would be the total number of shares outstanding after (a), (b) and (c)?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd