0
1.0kviews
Computer Forensic and Cyber Applications : Question Paper Dec 2015 - Computer Engineering (Semester 5) | Pune University (PU)
1 Answer
0
8views

Computer Forensic and Cyber Applications - Dec 2015

Computer Engg (Semester 5)

TOTAL MARKS: 100
TOTAL TIME: 3 HOURS
(1) Question 1 is compulsory.
(2) Attempt any four from the remaining questions.
(3) Assume data wherever required.
(4) Figures to the right indicate full marks.


Solve any one question from Q1 and Q2

1 (a) Explain schedule selection & coordination of sensor MAC.(8 marks) 1 (b) Explain staircase digital investigation process model with diagram.(6 marks) 1 (c) Describe in brief how computer intenders operate.(6 marks) 2 (a) Define network topology & explain various network topologies.(9 marks) 2 (b) Describe four fundamental principles of handling digital crime scenes.(6 marks) 2 (c) Explain need of crime scene survey & documentation.(5 marks)


Solve any one question from Q3 and Q4

3 (a) (i) Explain:
Private key Encryption.
(5 marks)
3 (a) (ii) Explain:
Public key Encryption.
(5 marks)
3 (b) Write short note on preservation of Hardware as a Digital Evidence.(8 marks) 4 (a) Write a short note on Cyber Stalking & Cyber stalkers?(8 marks) 4 (b) Write a short note on:
Anonymity & Surreptitious Monitoring with respect to cyber stalking.
(8 marks)


Solve any one question from Q5 and Q6

5 (a) Explain patents, copyrights, trademarks in detail.(8 marks) 5 (b) Explain in detail types of evidences on mobile devices.(8 marks) 6 (a) Write a short note on file system traces on UNIX.(8 marks) 6 (b) Explain NTFS file system.(8 marks)


Solve any one question from Q7 and Q8

7 (a) (i) Explain:
Ethernet.
(5 marks)
7 (a) (ii) Explain:
ATM Networks.
(5 marks)
7 (b) Explain authentication & operating system logs in TCP/IP related digital evidence.(9 marks) 8 (a) What is email forgery & tracking?(9 marks) 8 (b) Explain different Internet Services and justify Internet as an Investigative Tool.(9 marks)

Please log in to add an answer.