Can you Answer these 10 Basic eDiscovery Questions?

by | Oct 8, 2015

10 Basic eDiscovery Questions

Note: The following is a guest post from Daryn Teague, who provides support to the litigation software product line within the LexisNexis software division.

If you work in the litigation field, you’ve probably read articles, attended conference sessions, perused blogs and maybe even waded through entire books dedicated to educating you about the world of eDiscovery. Are you curious to see how much of that information you’ve retained?

Michael W. Mallory, Esq., who coordinates the delivery of LexisNexis eDiscovery and litigation technology to law firms in the Potomac region, hosted a CLE Webinar last week in which he helped litigation professionals connect the dots with eDiscovery. After walking participants through the basics of eDiscovery and the individual components of the Electronic Discovery Reference Model (EDRM), Mallory invited them to take a quiz regarding their knowledge of the subject.

Take this quiz for yourself and see how you do:

1. Place these in order of smallest to largest amount of data: (a) Petabyte; (b) Megabyte; (c) Terabyte; (d) Gigabyte.

2. The NIST list: (a) refers to data from the National Software Reference Library; (b) assists in the production of eDiscovery; (c) is a log generated when emails from the same string are clustered together; (d) occurs in the analysis stage of the EDRM.

3. An “.exe” is a program file that doesn’t contain relevant data: (a) True; (b) False.

4. The best use of deduplication is: (a) prior to production; (b) prior to processing; (c) prior to review; (d) prior to collection in order to have each records custodian give you only one copy.

5. Processing typically involves which of the following: (a) extracting text and metadata; (b) tagging; (c) creating image files; (d) culling to reduce the amount of data reviewed; (e) both a and c.

6. Hashing refers to: (a) a process of scrambling a file for encryption; (b) a process for calculating a unique ID for a document; (c) the process of cracking a password on an encrypted file; (d) the clustering of similar emails from the same string or conversation.

7. SHA-1 hash values: (a) are the informal industry standard; (b) ignore capitalization; (c) are highly unlikely to be the same for two different files; (d) are less reliable than MD5; (e) c and d.

8. Deduplicating the entire data collection: (a) is not a Best Practice – deduping is always done on a custodian level; (b) decreases the risk of inconsistent review decisions; (c) increases confidentiality by lowering the number of people likely to have access to the records; (d) reduces review time and expense; (e) b, c and d.

9. Which of the following is not typically done as part of document review: (a) tagging; (b) culling; (c) searching; (d) redacting.

10. Which of the following is likely to be allowed in applications for costs: (a) cost of printing documents for review; (b) cost of scanning and OCR’ing documents after they have been reduced to paper; (d) cost of printing documents for production; (d) none of the above.

Now take a look at the answers below and give yourself a grade. If you feel like you could use a brush-up on connecting the eDiscovery dots, you can watch a recording of the webinar at your convenience.

Additional eDiscovery webinars slotted for later in October include:

* * *


  1. b; d; c; a
  2. a
  3. b
  4. b
  5. e
  6. b
  7. c
  8. e
  9. b
  10. d

If you enjoyed this post, you might also like:
Devil is in the Data and 20 Other Must-Read eDiscovery Articles

Photo credit: Flickr, Kevin Dooley, Question (CC BY 2.0)

    Contact Us

    To learn more or schedule a free demo of CounselLink, simply fill out the form below.

    First Name *

    Last Name *

    Work Phone *

    Work Email: *

    Company *

    Country *

    Zip Code * ( USA Only )

    Inquiry *

    LexisNexis, a division of RELX Inc. and our LexisNexis Legal & Professional affiliates may further contact you in your professional capacity about related products, services and events. You will be able to opt-out at any time via the unsubscribe link provided within our communications or manage your communication preferences via our Preference Center. For more information, see our Privacy Policy.