written 7.3 years ago by |
Computer Forensic and Cyber Applications - Dec 2015
Computer Engg (Semester 5)
TOTAL MARKS: 100
TOTAL TIME: 3 HOURS
(1) Question 1 is compulsory.
(2) Attempt any four from the remaining questions.
(3) Assume data wherever required.
(4) Figures to the right indicate full marks.
Solve any one question from Q1 and Q2
1 (a) Explain schedule selection & coordination of sensor MAC.(8 marks) 1 (b) Explain staircase digital investigation process model with diagram.(6 marks) 1 (c) Describe in brief how computer intenders operate.(6 marks) 2 (a) Define network topology & explain various network topologies.(9 marks) 2 (b) Describe four fundamental principles of handling digital crime scenes.(6 marks) 2 (c) Explain need of crime scene survey & documentation.(5 marks)
Solve any one question from Q3 and Q4
3 (a) (i) Explain:
Private key Encryption.(5 marks)
3 (a) (ii) Explain:
Public key Encryption.(5 marks)
3 (b) Write short note on preservation of Hardware as a Digital Evidence.(8 marks)
4 (a) Write a short note on Cyber Stalking & Cyber stalkers?(8 marks)
4 (b) Write a short note on:
Anonymity & Surreptitious Monitoring with respect to cyber stalking.(8 marks)
Solve any one question from Q5 and Q6
5 (a) Explain patents, copyrights, trademarks in detail.(8 marks) 5 (b) Explain in detail types of evidences on mobile devices.(8 marks) 6 (a) Write a short note on file system traces on UNIX.(8 marks) 6 (b) Explain NTFS file system.(8 marks)
Solve any one question from Q7 and Q8
7 (a) (i) Explain:
Ethernet.(5 marks)
7 (a) (ii) Explain:
ATM Networks.(5 marks)
7 (b) Explain authentication & operating system logs in TCP/IP related digital evidence.(9 marks)
8 (a) What is email forgery & tracking?(9 marks)
8 (b) Explain different Internet Services and justify Internet as an Investigative Tool.(9 marks)