Exam 2 - Records and Information: Creation and Use Flashcards Preview

CRM Exam > Exam 2 - Records and Information: Creation and Use > Flashcards

Flashcards in Exam 2 - Records and Information: Creation and Use Deck (70)
Loading flashcards...
1

Some organizations make the decision not to map all ESI but only data they deem:
a. a risk to the organization
b. inactive
c. active
d. recoverable
e. professional in nature

a. a risk to the organization

2

_____ can be applied to brand names, logos, service marks and emblems.
a. Patents
b. Trademarks
c. Trade rights
d. Copyright
e. Trade secret protection

b. trademarks

3

A risk assessment site survey includes:
a. developing an updated set of floor plans
b. locating a records disaster recovery site
c. performing a physical property inventory
d. determining structural and environmental safety
e. determining record retention requirements

d. determining structural and environmental safety

4

_____ is descriptive information about electronic records.
a. Input data
b. Taxonomy
c. Metadata
d. Source code
e. Spoliation

c. metadata

5

Corporate email messages are:
a. always classified
b. unclassified
c. archived
d. potential records
e. exempt from legal discovery

d. potential records

6

Blank forms are considered:
a. records
b. for retention
c. useless
d. nonrecords
e. vital

d. nonrecords

7

The process of periodically converting electronic records to new file formats or new storage media is:
a. reusability
b. digital asset management
c. printing
d. media stability
e. data migration

e. data migration

8

Proprietary file formats for electronic records are also referred to as _____ formats.
a. native
b. encrypted
c. secure
d. classified
e. audit

a. native

9

Changes in _____ can render previously recorded information unusable.
a. migration
b. servers
c. software
d. retention
e. users

c. software

10

If a taxonomy for an enterprise content management system has been carefully developed:
a. records retention policies are no longer valid
b. it will change as business processes evolve
c. users will no longer have input into its design
d. records are no longer discoverable
e. maintenance agreements will become null and void

b. it will change as business processes evolve - Deborah

c. users will no longer have input into its design - ARMA

11

Question 11
Electronic records must demonstrate _____ for admissibility purposes.
a. transferability
b. compliance
c. authenticity
d. spoliation
e. duplication

c. authenticity

12

Categorization software products employ synonym lists, pattern matching algorithms, word clustering, and word _____ to analyze a document’s content and identify key words for indexing purposes.
a. dictionaries
b. proximities
c. images
d. counts
e. rules

b. proximites

13

A _____ risk assessment is usually based on a physical survey of locations where vital records are stored.
a. compliance
b. financial
c. quantitative
d. confidential
e. qualitative

e. qualitative

14

Collaborative work tools can reduce both communication time and travel costs, and encourage:
a. compliance
b. security
c. creativity
d. privacy
e. encryption

c. creativity

15

_____ is destruction of evidence, including records that an organization knows are relevant to impending or ongoing litigation.
a. Encryption
b. Migration
c. Shredding
d. Spoliation
e. Resolution

d. spoliation

16

The investigative phase of litigation when the opposing party can obtain access to recorded information believed to be relevant to its case is:
a. spoliation
b. reference activity
c. court investigation
d. pre-trial discovery
e. continuity

d. pre-trial discovery

17

Websites that enable users to contribute, collaborate, and edit site content are:
a. libraries
b. archives
c. internets
d. blogs
e. wikis

e. wikis

18

One of the most significant differences between Web 2.0 and traditional Web 1.0 is greater _____ among Internet users.
a. stability
b. collaboration
c. confidentiality
d. intelligence
e. privacy

b. collaboration

19

ISO _____ is a framework of policies and procedures that includes all legal, physical, and technical controls involved in an organization's information risk management processes.
a. 15489
b. 74009
c. 89541
d. 27001
e. 26773

d. 27001 ARMA


a. 15489 - Deborah

20

A/An _____ policy is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.
a. social media
b. legacy
c. instant messaging
d. word processing
e. acceptable use

e. acceptable use

21

When receiving a subpoena for documents, the RIM manager must:
a) question the applicability of the subpoena.
b) question the authority of the court to issue the subpoena.
c) request instructions from the IT manager.
d) examine the subpoena to see what may be excluded.
e) suspend all destruction actions for responsive documents.

e. suspend aldl destruction actions for responsive documents

22

RIM Managers should work with the IT department to better understand all of the following, except:
a) retention schedule development.
b) access control authorization.
c) secure network transport.
d) data encryption.
e) standard operating procedures.

a. retention schedule development

23

An important feature of an email software application is a(an):
a) microfilm option for long term storage.
b) immediate destruction capability for all records.
c) use of discrete storage functions to avoid discovery.
d) encryption technology to ensure security.
e) local area network.

d. encryption technology to ensure security

24

The ideal electronic forms system:
a) provides for transmission of data only.
b) creates forms from word processing software.
c) provides for transmission of data and forms.
d) allows users to customize forms in the field.
e) provides for wireless transmission.

c. provides for transmission of data and forms

25

A _____ risk assessment of vital records is usually based on a physical survey of locations where vital records are stored, combined with a review of security procedures already in place.
a) business
b) hands-on
c) financial
d) qualitative
e) strategic

d. qualitative

26

When participating on a metadata development team, RIM managers contribute unique expertise in:
a) electronic records storage media.
b) categorizing, indexing, and classifying documents.
c) determining the appropriate retention for documents.
d) addressing EDMS implementation problems.
e) the management of traditional paper documents.

b. categorizing, indexing and classifying documents

27

Many businesses enhance the security of their email systems by:
a) limiting the number of users.
b) keeping all messages.
c) backing up messages on off-site servers.
d) utilizing a gateway server and firewall.
e) requiring fingerprints on all emails.

d. utilizing a gateway server and firewall

28

To potentially limit _____, organizations that allow employees to participate in online public forums should add a disclaimer to the body of every email or posting.
a) legal liability
b) litigation discovery
c) phishing opportunities
d) security breaches
e) disgruntled employees

a. legal liability

29

_____ records document activities that are related to internal management and incidental to the organization's basic functions.
a) Program
b) Facilitative
c) Permanent
d) Substantive
e) Transitional

b. facilitative

30

A record’s _____ may be demonstrated through policies, procedures, practices, and documentation.
a) integrity
b) originator
c) use
d) provenance
e) source

a. integrity