DAY 1
1.
According to OAIS the designated community:
|
a |
is identified as a specified group of potential users able to understand sets of information being preserved |
x |
|
b |
is usually charged with developing auditing for digital repositories |
|
|
c |
creates Representation Information |
|
|
d |
must be an existing homogeneous set of users |
|
|
|
|
|
2.
Metadata is
|
a |
only concerned with format |
|
|
b |
only digital |
|
|
c |
anything |
x |
|
d |
only Representation Information and PDI |
|
|
|
|
|
3.
OAIS representation information (RepInfo)
|
a |
is only concerned with formats |
|
|
b |
is not required for conformance to OAIS |
|
|
c |
provide meaning to the preserved data objects |
x |
|
|
|
|
|
|
|
|
4.
Preservation planning
|
a |
Includes monitoring the Designated Community |
x |
|
b |
Is only necessary for large repositories |
|
|
c |
Is fixed and should only be changed every few years |
|
|
|
|
|
|
|
|
|
5.
Repositories need to keep records of all actions taken on AIPs because
|
a |
This provides an audit trail of changes |
x |
|
b |
This supports the determination of authenticity |
x |
|
c |
Auditors may ask for them |
x |
|
d |
All of the above |
x |
|
|
|
x |
6.
Representation Information
|
a |
Must come only from the content producer |
|
|
b |
Must be kept as it comes from the content producer |
|
|
c |
Must be ensured to be adequate for the designated community to understand the data |
x |
|
d |
Should be devised by the designated community |
|
|
e |
Is always part of an SIP |
|
7.
The AIP
|
a |
Is created by the designated community |
|
|
b |
Is created by the content producer |
|
|
c |
Is created by the repository |
x |
|
d |
Is always identical to the SIP |
|
|
e |
Is always different from the SIP |
|
8.
The OAIS Functional Model
|
a |
must be followed in order for an archive to achieve certification |
|
|
b |
provides a great deal of useful terminology |
x |
|
|
|
|
|
|
|
|
|
|
|
|
9.
The OAIS Reference Model::
|
a |
is not a design for an implementation of an archive |
x |
|
b |
is the design for an implementation of an archive |
|
|
|
|
|
|
|
|
|
|
|
|
|
10. A repository must be able to
demonstrate that it:
|
a |
can extract information from an AIP |
x |
|
b |
can hand over an AIP as a single file |
|
|
c |
has only one type of AIP |
|
|
d |
has many types of AIPs |
|
|
|
|
|
11. A repository must be able to
demonstrate that it:
|
a |
can identify all the members of the Designated Community |
|
|
b |
can assess changes to the knowledge base of the Designated Community |
x |
|
c |
has the same Designated Community for all its holdings |
|
|
|
|
|
|
|
|
|
12. Access rights information:
|
a |
is provided by the producer and cannot be modified by the OAIS repository |
|
|
b |
is part of the preservation description information |
x |
|
c |
is a type of Representation Information. |
|
|
|
|
|
|
|
|
|
DAY 2
13. An AIP :
|
a |
may be identical to an SIP |
|
|
b |
may be identical to a DIP |
x |
|
c |
neither (a) nor (b) |
|
|
d |
both (a) and (b) |
|
|
|
|
|
14. An AIP may be regarded as:
|
a |
a simple static rendered passive object |
|
|
b |
a complex dynamic rendered active object |
|
|
c |
a complex static non-rendered passive object |
x |
|
|
|
|
|
|
|
|
15. An Archival Information Package
|
a |
may consist of several separate files |
x |
|
b |
must be a single file |
|
|
|
|
|
|
|
|
|
|
|
|
|
16. An audit:
|
a |
does need to cover everything in the repository |
|
|
b |
does not need to cover everything in the repository |
x |
|
|
|
|
|
|
|
|
|
|
|
|
17. An Information Property:
|
a |
Is Representation Information |
|
|
b |
Is always a Significant Property |
|
|
c |
Both (a) and (b) |
|
|
d |
Has a value which is encoded in the Content Data Object |
x |
|
|
|
x |
18. Authenticity
|
a |
is always either yes or no |
|
|
b |
is judged on the basis of evidence such as Provenance |
x |
|
c |
Is important for understanding what a data object means |
|
|
|
|
|
|
|
|
|
19. Does the definition of the Designated
Community depend only on the digital object?
|
a |
Yes |
|
|
b |
No |
x |
|
|
|
|
|
|
|
|
|
|
|
|
20. Is Packaging Information the same as Representation
information:
|
a |
yes |
x |
|
b |
no |
|
|
|
|
|
|
|
|
|
|
|
|
|
21. What does a SIP have to have?
|
a |
an AIP |
|
|
b |
Content Information |
|
|
c |
Packaging Information |
x |
|
d |
nothing |
|
|
|
|
|
22. Which of the following must
Preservation Implementation Plans be tested against to make sure they are
adequate?
|
a |
Preservation strategic plans |
|
|
b |
Preservation policies |
x |
|
c |
Transformation Information Properties |
|
|
d |
Designated Community |
|
|
e |
Authenticity |
|
DAY 3
23. A Submission Information Package:
|
a |
is verified for completeness and correctness before the ingest phase. |
|
|
b |
is never rejected once submitted for ingestion. |
|
|
c |
may be empty. |
x |
|
|
|
|
|
|
|
|
24. AIPs can be located and retrieved
using:
|
a |
the reference information in the PDI |
|
|
b |
the context information in the PDI |
|
|
c |
a bi-directional linkage between the representation information and the content digital object |
|
|
d |
associated descriptive information |
x |
|
|
|
x |
25. An Information property is described
by the information property description and:
|
a |
the value can be found in the content data object. |
x |
|
b |
can be found in the context part of the preservation description information. |
|
|
c |
is primarily used as a search parameter. |
|
|
|
|
|
|
|
|
|
26. Are there commercial systems which
are OAIS compliant?
|
a |
Yes |
|
|
b |
No |
x |
|
|
|
|
|
|
|
|
|
|
|
|
27. Is ISO 2700x certification enough to
be a TDR?
|
a |
Yes |
|
|
b |
No |
x |
|
|
|
|
|
|
|
|
|
|
|
|
28. ISO 2700x certification is always
required?
|
a |
Yes |
|
|
b |
No |
x |
|
|
|
|
|
|
|
|
|
|
|
|
29. Mechanisms for discovering digital
material in the repository are generally readily available since:
|
a |
the context information provided for PDI is sufficient for searching |
|
|
b |
the repositories need to search their digital holdings for their own purposes. |
x |
|
c |
the representation information provided as part the content information is sufficient for searching. |
|
|
|
|
|
|
|
|
|
30. Progress reports at agreed points
during the ingest process:
|
a |
are provided by both the repository and producer |
|
|
b |
are provided by the repository to the producer |
x |
|
c |
are independent of any workflow |
|
|
|
|
|
|
|
|
|
31. The control over digital objects:
|
a |
must be documented with the aim, among others, of qualifying the communication between the repository and the producer |
x |
|
b |
must be only based on bit stream integrity measurement |
|
|
c |
does not require an agreement with the producer |
|
|
|
|
|
|
|
|
|
32. The Ingest phase is crucial because:
|
a |
often it is the only time when some important representation information and preservation descriptive information can be captured. |
x |
|
b |
all content information is normalized at this time. |
|
|
c |
it is the only time fixity information can be generated for the AIP. |
|
|
|
|
|
|
|
|
|
33. The Provenance of a Submission
Information Package:
|
a |
has little role in supporting the intelligibility of the Content Information. |
|
|
b |
must always identify the harvesting process. |
|
|
c |
must identify the producer |
x |
|
|
|
|
|
|
|
|
34. The repository must provide
mechanisms for discovering and retrieving AIPs since:
|
a |
representation Information and evidence about Authenticity can be found via the AIP. |
x |
|
b |
the consumer typically requests the AIP first. |
|
|
c |
the content digital objects can only be found through the AIP. |
|
|
|
|
|
|
|
|
|
35. Access Policies do not cover:
|
a |
statements of what is accessible |
|
|
b |
requirements for authentication and authorization of accessors |
|
|
c |
the relationship between an AIP and a SIP |
x |
|
d |
recording of access actions |
|
|
|
|
|
36. The Conformity Assessment Body (CAB):
|
a |
establishes the general audit plan. |
x |
|
b |
establishes specific requirements that satisfy ISO 16919. |
|
|
c |
assesses the auditors. |
|
|
d |
all of the above. |
|
|
|
|
|
37. What is an acceptable limit with
respect to evidence that should be inspected:
|
a |
assume that no risks are allowed. |
|
|
b |
allow the repository to make judgements. |
|
|
c |
go as deep and broad as necessary to find potential issues. |
x |
|
|
|
|
|
|
|
|
38. What is not an acceptable validation
methodology for assessing evidence:
|
a |
asking “what if” questions related to major threats. |
|
|
b |
ask a member of the Designated Community if they can use the information |
|
|
c |
ask the repository for their expert advice on the technical issues. |
x |
|
|
|
|
|
|
|
|
39. Which is not an acceptable approach
to auditing:
|
a |
work through the metrics in sequence. |
x |
|
b |
follow the process from SIP to AIP to DIP. |
|
|
c |
start with any “red flags” in the repository’s self-assessment |
x |
|
d |
start with the Designated Community’s list of issues. |
x |
|
|
|
x |
40. Which of the following are determined
for the approach and conduct of an audit:
|
a |
what is expected from the client organization in advance. |
|
|
b |
how many auditors will take part. |
|
|
c |
what access to staff, documentation and systems is required. |
|
|
d |
all of the above. |
x |
|
|
|
x |
41. Which of the following is a
competency required for audit planning:
|
a |
auditor is technically competent to audit assigned products and processes. |
|
|
b |
auditor can optimize audit time. |
|
|
c |
all of the above. |
x |
|
|
|
|
|
|
|
|
42. Which of the following is a method
for collecting information to be used as evidence:
|
a |
interviews |
|
|
b |
observation of processes and activities. |
|
|
c |
review of documentation and records. |
|
|
d |
all of the above. |
x |
|
|
|
x |
43. Which of the following is true:
|
a |
a self-audit is typically not useful in preparation for an audit. |
|
|
b |
a request by the audit team for extra evidence is seldom allowed. |
|
|
c |
the identification of areas for potential improvement are not an audit objective. |
|
|
d |
the scope of an audit includes physical boundaries. |
x |
|
|
|
x |
44. A collection policy is: (identify all
the correct answers)
|
a |
an option to be defined case by case |
|
|
b |
a requirement necessary to guide the acquisition process |
x |
|
c |
a document able to specify the types and the nature of the information preserved and to better define the needs of the Designated Community |
x |
|
|
|
|
|
|
|
|
45. A member of the Designated Community
for an AIP: (identify all the correct answers)
|
a |
must be enabled to understand the Content Information |
x |
|
b |
must be able to get information to judge the authenticity of the object that is being preserved |
x |
|
c |
should be able to re-create the SIPs that made the AIP |
|
|
|
|
|
|
|
|
|
46. A new Version of an AIP is created:
(identify all the correct answers)
|
a |
each time the AIP is repackaged even if it does not affect the Content Information |
|
|
b |
only when the Content Information is Transformed |
x |
|
|
|
|
|
|
|
|
|
|
|
|
47. Access rights information:
|
a |
is provided by the producer and cannot be modified by the OAIS repository |
|
|
b |
can be found in the content data object, the representation information, or the preservation description information |
x |
|
c |
is a type of Representation Information. |
|
|
|
|
|
|
|
|
|
48. An AIP should: (identify all the
correct answers)
|
a |
have a persistent identifier |
x |
|
b |
be a single file |
|
|
c |
include Representation Information |
x |
|
|
|
|
|
|
|
|
49. An AIP: (identify all the correct
answers)
|
a |
may be identical to an SIP |
|
|
b |
may be made up of information from one or more SIPs |
x |
|
c |
may be made up of many files |
x |
|
|
|
|
|
|
|
|
50. An AIP: (identify all the correct
answers)
|
a |
must never be altered or deleted |
|
|
b |
must have fixity information about the content information |
x |
|
c |
must be traceable to information provided by the Producer |
x |
|
|
|
|
|
|
|
|
51. Based on the above Risk Matrix and
project information: If Risk Planning requires a Risk Mitigation strategy for
all Projects with a Medium or Higher Risk Impact, then which Projects should
have a Risk Mitigation strategy (identify all the correct answer)
|
a |
Project ABC |
x |
|
b |
Project MMM |
x |
|
c |
Project ZYX |
x |
|
|
|
|
|
|
|
|
52.
Based on the Risk Matrix below and project information. (identify all the correct answers)
53.
RISK MATRIX
54.
Likelihood
55.
Consequence Very Low Low Medium
High Very High
56.
Very High Low Medium High
Very High Very High
57. High
Low Medium Medium High Very High
|
a |
A Risk Mitigation for Project ABC should be prioritized in front of Project MMM. |
x |
|
b |
A Risk Mitigation for Project MMM should be prioritized in front of Project ABC. |
|
|
c |
A Risk Mitigation for Project ABC should be prioritized in front of Project ZYX. |
x |
|
d |
A Risk Mitigation for Project ZYX should be prioritized in front of Project ABC. |
|
|
e |
A Risk Mitigation for Project MMM should be prioritized in front of Project ZYX. |
|
58. Changes in a repository : (identify
all the correct answers)
|
a |
must be documented |
x |
|
b |
will not affect the AIPs as long as the original Fixity information is maintained |
|
|
c |
must take into account changes in people as well as technology |
x |
|
|
|
|
|
|
|
|
59. Contextual metadata associated with
the content information could include:
|
a |
provenance information |
|
|
b |
restrictions on access |
|
|
c |
representation information |
|
|
d |
all of the above |
x |
|
|
|
x |
60. Does the definition of the Designated
Community depend only on the digital object?
|
a |
Yes |
|
|
b |
No |
x |
|
|
|
|
|
|
|
|
|
|
|
|
61. For Digital Objects, the repository
should … (identify all the correct answers)
|
a |
manage the number of copies |
x |
|
b |
manage the location of each copy |
x |
|
c |
have the same number of copies of each Digital Object |
|
|
d |
maintain an off-site copy |
x |
|
|
|
x |
62. Given one of its AIPs a repository
must be able to: (identify all the correct answers)
|
a |
obtain Representation Information |
x |
|
b |
obtain PDI |
x |
|
c |
be able to use the content information |
|
|
d |
identify which definition applies to the AIP |
x |
|
|
|
x |
63. How does ISO 16363 relate to the ISO
27000 series of standards? (identify all the correct answers)
|
a |
ISO 16363 is better to use than ISO 27000 series for audit of trustworthy repositories |
x |
|
b |
ISO 27000 series is better to use than ISO 16363 for audit of trustworthy repositories |
|
|
c |
ISO 16363 is a subset of ISO 27000 series |
|
|
d |
ISO 27000 series is a subset of ISO 16363 |
|
|
e |
ISO 27000 series and ISO 16363 are not related in any way |
|
64. If a Risk Mitigation strategy is not
required for a Risk with Low Impact, then a Risk with a Low Impact should no
longer be listed in your Risk Register.
|
a |
TRUE |
|
|
b |
FALSE |
x |
|
|
|
|
|
|
|
|
|
|
|
|
65. ISO 2700x certification is always
required?
|
a |
Yes |
|
|
b |
No |
x |
|
|
|
|
|
|
|
|
|
|
|
|
66. PDI in an AIP must updated: (identify
all the correct answers)
|
a |
each time the AIP is repackaged even if it does not affect the Content Information |
|
|
b |
only when the Content Information is Transformed |
x |
|
c |
when a new Edition of the AIP is created |
|
|
|
|
|
|
|
|
|
67. The ability of the Designated
Community to discover material of interest (identify all the correct answers)
|
a |
implies that appropriate tools are put in place by the repository |
x |
|
b |
cannot be improved beyond the descriptive information provided by the producer |
|
|
|
|
|
|
|
|
|
|
|
|
|
68. The access policies for
preservation: (identify all the correct
answers)
|
a |
require tools for addressing security |
x |
|
b |
are based on the producer decision |
|
|
c |
cannot provide adequate authenticity evidence to the users if accurate information is not collected at an early stage |
|
|
|
|
|
|
|
|
|
69. The control over digital objects for
SIPs accuracy: (identify all the correct
answers)
|
a |
must be documented with the aim, among others, of qualifying the communication between the repository and the producer |
x |
|
b |
must be only based on bit stream integrity measurement |
|
|
c |
should include an agreement with the producer |
x |
|
|
|
|
|
|
|
|
70. The definition of the Designated Community
for an Information Object: (identify all the correct answers)
|
a |
may vary from one repository to another |
x |
|
b |
is created by the repository |
x |
|
c |
could be “anyone” |
|
|
|
|
|
|
|
|
|
71. The descriptive information (identify
all the correct answers)
|
a |
will be captured by the repository at the ingestion phase |
x |
|
b |
can be further improved in the preservation phase |
x |
|
c |
must focus only on domain descriptive standards |
|
|
|
|
|
|
|
|
|
72. The Disaster Recovery Plan (identify
all the correct answers)
|
a |
should be updated on a regular basis |
x |
|
b |
a copy of it should be held off-site |
x |
|
c |
the repository should train staff on Disaster Recovery Plan |
x |
|
|
|
|
|
|
|
|
73. The formal succession plan: (identify
all the correct answers)
|
a |
is required to ensure continuity of the repository and make explicit exit strategies |
x |
|
b |
may be linked to national legislation and to the legal nature of the repository |
x |
|
c |
can be avoided in case of well defined disaster plans and detailed depositors agreements |
|
|
|
|
|
|
|
|
|
74. The information associated with content
to be preserved: (identify all the correct answers)
|
a |
is relevant to provide control for SIPs completeness and accuracy |
|
|
b |
must be specified for ensuring extraction from SIP |
|
|
c |
is provided by depositors without any active role of the repository which plays a neutral role |
|
|
|
|
|
|
|
|
|
75. The information properties: (identify
all the correct answers)
|
a |
should be defined at a later time after the submission |
|
|
b |
should be associated with some Representation Information |
x |
|
c |
are relevant to support the authenticity evidence |
x |
|
|
|
|
|
|
|
|
76. The mission statement (identify all
the correct answers)
|
a |
must include a reference to the preservation of digital information |
x |
|
b |
is required only if public information is preserved |
|
|
c |
can refer to a statement approved by a parent organization |
x |
|
|
|
|
|
|
|
|
77. The preservation plans : (identify
all the correct answers)
|
a |
may vary from one repository to another |
x |
|
b |
is created by the repository |
x |
|
c |
should be designed by the Designated Community |
|
|
|
|
|
|
|
|
|
78. The repository must provide
mechanisms for discovering and retrieving AIPs since:
|
a |
Representation Information and evidence about Authenticity are found via the AIP. |
x |
|
b |
the consumer typically requests the AIP first. |
|
|
c |
the content digital objects can only be found through the AIP. |
|
|
|
|
|
|
|
|
|