RelOne DATA BREACH RESPONSE Certification Flashcards
- What is Data Breach Response?
a. An AI-powered solution used to reduce the time, cost,
and risk to produce an entity notification list.
b. An AI solution used to reduce the time, cost, and risk to
produce a set of redacted documents.
c. An AI solution used to remove the need for human review
in order to generate an entity notification list.
a. An AI-powered solution used to reduce the time, cost,
and risk to produce an entity notification list.
- What unit is billed for Data Breach Response?
a. Number of documents ingested.
b. Gigabytes of data in Data Breach Response per month.
c. Number of entities found.
b. Gigabytes of data in Data Breach Response per month.
- How can you provide RelativityOne users access to Data
Breach Response?
a. Add them to a group that has the correct permissions set.
b. It is automatically available for all users after installing the
application.
c. Contact Relativity to have their accounts created.
a. Add them to a group that has the correct permissions set.
- What must you provide to analyze documents in Data Breach
Response?
a. A list of terms and PI types that the AI will use for
personal information identification.
b. A saved search with documents to ingest.
c. An entity notification list
b. A saved search with documents to ingest.
- How does Data Breach Response link personal information
(PI) for structured and unstructured documents?
a. PI is automatically linked for structured documents and automatically linked for unstructured documents.
b. PI is automatically linked for structured documents and manually linked for unstructured documents.
c. PI is manually linked for structured documents and automatically linked for unstructured documents.
b. PI is automatically linked for structured documents and manually linked for unstructured documents.
- What is an advantage of Data Breach Response compared to
other solutions?
a. It automates the entire data breach response process.
b. Its a purpose-built data breach application in RelativityOne.
c. It builds notification lists in a few hours.
b. Its a purpose-built data breach application in RelativityOne.
- What tools does Data Breach Response leverage for
personal information identification?
a. Pre-built AI and ML models to find pre-determined PI types.
b. User-created AI and ML models to find pre-determined PI
types.
c. User-created AI and ML models to find unknown PI types.
a. Pre-built AI and ML models to find pre-determined PI types.
- How does Data Breach Response expedite manual
deduplication efforts while still providing transparency into
the process, leading to faster and cleaner generation of
entity reports?
a. Through automatic deduplication of personal information.
b. Through automatic linking of personal information across
all document formats.
c. Through automatic deduplication of entities and entity review workflows.
c. Through automatic deduplication of entities and entity review workflows.
- What is a benefit to using Data Breach Response?
a. Data never leaves the RelativityOne security boundary.
b. You can determine the relationship between impacted individuals and fraudulent activity.
c. It provides endpoint threat detection capabilities to prevent malicious activity and threat actors.
a. Data never leaves the RelativityOne security boundary.
- How much can review time be reduced, on average, when
leveraging AI in Data Breach Response?
a. 25%
b. 50%
c. 75%
b. 50%
- How long does it take, on average, to produce an initial assessment of personal information found within a data set?
a. 2-3 days
b. 4-5 days
c. 7 days
a. 2-3 days
- What are the two reports that can be used to QC entity results?
a. Deduplicate and Normalize Entities table and Merge reason table.
b. Unlinked PI Log and Document Report.
c. Merge reason table and Unlinked PI Log.
a. Deduplicate and Normalize Entities table and Merge reason table.
- What information about entities is searchable with PI and Entity Search?
a. Jurisdiction the entity resides in.
b. Entity count on the document.
c. Other names an entity is known by in the dataset.
b. Entity count on the document.
- What should you do after resolving conflicts generated by the automatic entity normalization process?
a. Run an Entity Centric Report job from the Reports tab and export the report as an excel document; no Incorporate Feedback processing is necessary.
b. Rerun the deduplicate individuals and report generation Incorporate Feedback stages to record your changes and generate an updated version of the Entity Centric Report.
c. Rerun the report generation Incorporate Feedback stage to record your changes and generate an updated version of the Entity Centric Report.
b. Rerun the deduplicate individuals and report generation Incorporate Feedback stages to record your changes and generate an updated version of the Entity Centric Report.
- What is the purpose of configuring your deduplication preferences?
a. To ensure your coding layout is configured with the fields you want your review team to utilize.
b. To ensure every entity name requiring redaction is unique.
c. To tell the algorithm how to deduplicate the entities found within the data set.
c. To tell the algorithm how to deduplicate the entities found within the data set.
- What is the purpose of resolving conflicts within Entity Clusters?
a. To perform quality control efforts on the machine-generated list of entities with possible similarities.
b. To manually normalize and deduplicate all entities identified by a human review team earlier in the project.
c. To manually resolve all tertiary conflicts while relying on automatic normalization processes to resolve primary and secondary conflicts.
a. To perform quality control efforts on the machine-generated list of entities with possible similarities.
- What syntax can you use for a PI and Entities Search to find
documents with a breached entity?
a. CONTAINS DATA BREACH ENTITY
b. CONTAINS BREACH
c. CONTAINS PI
a. CONTAINS DATA BREACH ENTITY
- What report can you use to resolve a conflict within a cluster if there are two people with the same name but differing
social security numbers?
a. Merge reason table.
b. Deduplicate and Normalize Entities table.
c. Entity Centric Report.
b. Deduplicate and Normalize Entities table.
- In which situation would the Unlinked PI Log be most useful?
a. To identify all personal information that has not yet been linked to an entity in the dataset.
b. To configure the deduplication settings that will be used to normalize entities in the dataset.
c. To see a high-level snapshot of all personal information found in the dataset.
a. To identify all personal information that has not yet been linked to an entity in the dataset.
- What type of Review Center queue should be used for Data Breach Response?
a. Data breach review queue.
b. Coverage review queue.
c. Saved search review queue.
c. Saved search review queue.
- What is the purpose of the final Entity Centric Report in a data breach?
a. It demonstrates how many documents in the dataset contain personal information and which documents are likely to contain entities who need notified.
b. It gives users a list of entities found in the dataset, which can be used as search terms to build a review queue.
c. It provides a notification list of all entities found in the dataset and which of their personal information was breached.
c. It provides a notification list of all entities found in the dataset and which of their personal information was breached.
- What is the best method for identifying medical information using Data Breach Response?
a. Create a custom detector for date of birth.
b. Turn on the Medical Information document classifier.
c. Create a saved search for ‘patient’ OR ‘medical’.
b. Turn on the Medical Information document classifier.
- When linking personal information to an individual, where will the linked information appear?
a. The Linked Entities panel.
b. The PI Detection panel.
c. The coding layout
a. The Linked Entities panel.
- What does the initial Document Report tell you about a data breach?
a. It predicts which documents in the dataset may be privileged and should be reviewed outside of the Data Breach Response platform.
b. It provides an understanding of which reviewers work will need a second review to ensure the final Entity Centric Report’s accuracy.
c. It provides an initial impact assessment of the scope of the breach including what personal information was found.
c. It provides an initial impact assessment of the scope of the breach including what personal information was found.