Legal functions are the most important area of ig impact

Assignment Help Basic Computer Science
Reference no: EM132348903

1. Legal functions are the most important area of IG impact. Under the FRCP amendments, corporations must proactively manage the e-discovery process to avoid what?

A. a loss of public trust

B. unfavorable rulings

C. Sanctions,

D. All of the above

2. The implementation of an LHN program attacks some of the low-hanging fruit within an or an organization's overall IG position. This part of the e-discovery life-cycle must not be outsourced. Why is this the case?

A. Retained counsel does not provide input or the mechanics of the LHN don't need to manage and owned by the internal corporate resources

B. Retained counsel provides input, but the mechanics of the LHN must be managed and owned by the internal corporate resources

C. No internal ownership is required by the counsel's engagement in this situation

D. Both A and C

3. The ...............................is a visual planning tool created by EDRM.net to assist in identifying and clarifying the stages of the e-discovery process?

A. Guidelines for E-Discovery Planning

B. E-Discovery Reference Model

C. Information Management Protocol

D. None of the above

4. According to recent surveys regarding Big Data and its impacts, approximately 25................... percent of information stored in organizations has real business value, while 5................ percent must be kept as business records and about 1............... percent is retained due to a litigation hold.

A. 1, 5, 25

B. 25, 5, 1

C. None of the above

D. 25, 5, 2

5. What is ISO 38500? ........................................... that provides high-level principles and guidance for senior decision-makers

A. A. International Metric

B. European and American Standard Procedure

C. International standard

D. International Organization Law

6. Principles of IG are on the evolutionary edge, and therefore, most successful IG programs have been characterized by ten key principles which have become the .............................................and should be designed into the IG approach.

A. Basic foundation

B. Both A and B

C. basis for best practices

D. Design

7. Principles of IG are on the evolutionary edge, and therefore, most successful IG programs have been characterized by ................................. key principles which have become the basis for best practices and should be designed into the IG approach.

A. None of the above B. Ten C. Five D. Eleven

8. What is the ITIL?

A. A set of process-oriented best practices

B. A group of metrics that govern the program

C. Focuses on value delivery

D.All of the above.

9. The principles of successful IG programs are emerging, and they include executive sponsorship, and.................., .................., .................., ..............., ..............., ............, ............, .................., and ...............?

A. Information classification, integrity, security, accessibility, control, monitoring, auditing, policy development, and continuous improvement

B. A and BC.Information classification, integrity, security, accessibility, control, monitoring, auditing, policy development, and continuous metrics

C. Information classification, integrity, security, personally identifiable information, control, monitoring, auditing, policy development, and continuous improvement

10. Generally Accepted Recordkeeping Principles are sometimes known as the .............................?

A. The ARMA Principles

B. The IG Principles

C. None of the above

D. The GAR Principles

11. Risk Profile creation is a basic building block in the Enterprise Risk Management to assist executives to understand the risks associated with?

A. Stated Business Objectives

B. Both A, B, and C

C. Stated Business Goals

D. Stated Business Agreements

12. According to the best business practices associated with and approved by IG Subject Matter experts, there are three (3) key Event-Based prerequisites that must be completed before an event-based disposition can be implemented. These prerequisites are?

A. None of the above

B. The ERM Systems must have complete retention and disposition capabilities, A clear start date is a required, Clarify trigger events

C. Clarify trigger events, an aautomated capture of agreed-on trigger events must be performed and sent to the ERM, The ERM Systems must have complete retention and disposition capabilities

D. A clear start date is a required, Retention periods must be segmented into active and inactive, Clarify trigger events

13. Which one of the following is TRUE about the IG Reference Model?

A. Linking duty + policy integration = efficient, effective management

B. Linking duty + value to information asset = efficient, effective management

C. Linking duty + value to information asset = Unified governance, effective management

D. All of the above

14. .........is a process-based IT governance framework that represents a consensus of experts worldwide.

A. All of the above B.CobiT C. CobiTL D. CobiTX

15. IG is sort of a super discipline that encompasses a variety of key concepts from a variety of ....................................?

A. All of the above. B. Never overlapping disciplines C. Isolated discipline but comprehensive D. Related and overlapping disciplines

16. Predictive coding software leverages ............................. when experts review a subset of documents to teach the software what to look for, so it can apply this logic to the full set of .........................?

A. Human analysis, pages

B. Pattern search, intelligence

C. Human analysis, documents

D. Human Intelligence, documents

17. TRUE or FALSE: Unknown or useless data, such as old log files that take up space and continues to grow and requires regular clean-up is sometimes known as dark data

True

False

18. TRUE or FALSE: Clean, build and maintain, Survey and monetize are the 3 phases in the Yard's rebirth.

True

False

19. TRUE or FALSE: Clean, build and maintain, and monetize are the 3 phases in the Yard's rebirth

True

False

20. TRUE or FALSE: Good data governance ensures that downstream negative effects of poor data are avoided and that subsequent reports, analyses, and conclusions are based on reliable, and trusted data.

True

False

21. TRUE or FALSE: According to the Intersection of IG and E-Discovery, the Legal Hold Process is NOT a foundational element of Information Governance (IG).

True

False

22. Creating a ........................ is a basic building block in an ..................... that assists business executives understand the risks associated with stated business objectives.

A. Risk profile, Enterprise Risk Management

B. All of the above

C. ISO 9000, Heatmap

D. Risk Profile, Framework

23. What's the fundamental function of the GAR Principle?

A. Foster awareness of good record-keeping practices, and provides associated metrics to provide an IG framework to support continuous improvement

B. To deploy Gastric Analysis Revenue

C. Generally Accepted Recordkeeping principles is used to measure program profits

D. None of the above

24. One of the ten IG principles is a Continuous improvement. What is the importance of this principle to the organization program?

A. Ensure guidelines and policies are being followed to measure employee compliance

B. None of the aboveC.Document management and report management software must be deployed for control

C. Provide periodic program review and necessary adjustment against gaps and or shortcomings

25. From our Chapter 9; - Records Management (RM) is a key impact area of IG - so much that in the RM space, IG is often thought of as synonymous with or a single superset of RM. From that perspective, the International Organization for Standardization (ISO) defined business records as..............................................?

A. Both A and B

B. A. information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations or in the transaction in the form of Files

C. Information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations

D.  Information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations or in the transaction in the form of records

Reference no: EM132348903

Questions Cloud

How to think about and use ethical frameworks from book : These six small situations can be used to spark discussion about how to think about and use the ethical frameworks from the book.
Discuss importance of regular expressions in data analytics : Discuss the importance of regular expressions in data analytics. Also, discuss the differences between the types of regular expressions.
Social media governance for organizations : Social Media Governance for organizations: Discuss the issues that arise for organizations and the private/personal social media accounts of their employees.
Mapping cloud security controls to existing frameworks : This discussion focuses on mapping cloud security controls to existing frameworks or regulations. Download the Cloud Security Alliance Cloud Controls Matrix
Legal functions are the most important area of ig impact : Legal functions are the most important area of IG impact. Under the FRCP amendments, corporations must proactively manage e-discovery process to avoid what.
Advantages of open source software over proprietary software : What factors make one computer more powerful than another? What are the advantages of open source software over proprietary software?
Digital pracy and security and laws against cyber crime : Cyber Law Research paper Topic-Digital pracy and Security, Laws against cyber crime, The main causes of Cyber crimes, Bio metrics and Cyber Security
Discussion on the security of the internet of things : Your research paper will cover a brief discussion on the security of the Internet of Things (IoT) .
Describe how authentication has evolved over time : Describe how authentication has evolved over time and identify stressors that have resulted in changes to authentication.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd