Exam 2 - Records and Information: Creation and Use Flashcards Preview

CRM Exam > Exam 2 - Records and Information: Creation and Use > Flashcards

Flashcards in Exam 2 - Records and Information: Creation and Use Deck (70)
Loading flashcards...
61

A database containing proprietary information should be set up on:
a) an open portal system.
b) the company’s website.
c) an internal network behind a firewall.
d) a bulletin board.
e) a router maintained by the IT department.

c. an internal network behind a firewall

62

When assessing risk, the need for security must be balanced against the need for:
a) employee training programs.
b) policies and procedures.
c) communications equipment.
d) storage space expansion.
e) operational effectiveness.

e. operational effectiveness

63

Collaborative environments can reduce communication time, decrease travel costs, and encourage:
a) senior leadership support.
b) standardized work processes.
c) creativity.
d) ROI.
e) attendance.

c. creativity

64

From a judicial standpoint, a business record must be made:
a) only by the person whose job it is to create that records.
b) by or from information transmitted by a person who knowledge of the event.
c) in the source of a regularly conducted business activity.
d) on paper or on electronic media.
e) in the regular practice of that business activity.

e. in the regular practice of that business activity

65

Remote access to computer-stored records is a significant functional advantage but poses _____ problems.
a) security
b) back-up
c) mobility
d) server
e) viewing

a. security

66

_____ should be integrated into business rules for workflow and transaction systems.
a) Physical restrictions
b) Legal risks
c) Company archives
d) Records creation
e) Social networking

d. records creation

67

Web-based records are _____ in a browser-supported language such as HTML or XHTML.
a) collected
b) coded
c) managed
d) transferred
e) copied

b. coded

68

Records are generally introduced in evidence to support a case or point or view, or to:
a) illustrate the use of information technology.
b) review legal issues related to the records.
c) illustrate a “live” testimony.
d) respond to a subpoena.
e) present an organization’s policy.

d. respond to a subpoena

69

_____ is a crucial component of a RIM program designed to reduce the risk of privacy breaches.
a) Funding
b) Staffing
c) Leadership
d) Training
e) Reporting

d. training

70

A _____ is a catalog of an organization’s ESI by category, location, and custodian including how it is stored, its accessibility, and associated retention policies.
a) migration plan
b) disposition log
c) data dictionary
d) data map
e) data source

d. data map