Question: 33. This type of TAR methodology involves machine learning that creates a model for relevance and non-relevance in terms of legal document review. a propagation


33. This type of TAR methodology involves machine learning that creates a model for relevance and non-relevance in terms of legal document review. a propagation based b. facet driven C. rules driven d. sample driven 34. This type of security threat often times involves destroying equipment, gaining access to intellectual property, or removing sensitive information by email or portable media. a. malicious insider b. malicious vendor c. non-malicious insider d. malicious competitor d. ACT 36. This is a critical first step in developing a records retention schedule. a. information map b. heat map C. record provenance matrix d. documentmap 37. This type of e-discovery software routes documents through a series of steps to be processed. a. responsive b. sampling c. keyword search d. workflow
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
