Question Paper: Digital Forensics Question Paper - May 2017 - Computer Engineering (Semester 8) - Mumbai University (MU)
0

Digital Forensics - May 2017

MU Computer Engineering (Semester 8)

Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary
1(a) What is incident response? Explain goals of incident response. 5 marks

1(a) What is incident response? Explain goals of incident response. 5 marks

1(b) Explain the term Cyber terrorism with examples. 5 marks

1(b) Explain the term Cyber terrorism with examples. 5 marks

1(c) What is Evidence? Explain the types of Evidence. 5 marks

1(c) What is Evidence? Explain the types of Evidence. 5 marks

1(d) What is DOS attack? How to acheive recovery from DOS attack? 5 marks

1(d) What is DOS attack? How to achieve recovery from DOS attack? 5 marks

2(a) Explain volatile data collection procedure for Windows system. 5 marks

2(a) Explain volatile data collection procedure for Windows system. 5 marks

2(b) What are possible investigation phase carried out in Data Collection and Analysis. 5 marks

2(b) What are possible investigation phase carried out in Data Collections and Analysis. 5 marks

3(a) Explain Incident Response Methodology in detail. 5 marks

3(a) Explain Incident Response Methodology in detail. 5 marks

3(b) What are the steps involved in computer evidence handling? Explain in detail. 5 marks

3(b) What are the steps involved in computer evidence handling? Explain in detail. 5 marks

4(a) Explain importance of forensic duplication and its methods. 5 marks

4(a) Explain Importance of forensic duplicaiton and its methods. 5 marks

4(b) Describe levels of culpability. 5 marks

4(b) Describe levels of culpability. 5 marks

5(a) Explain various ethical issues concern in computer forensics. 5 marks

5(a) Explain various ethical issues concern in computer forensics. 5 marks

5(b) How you will trace the crime which has been happened through email. Using tool. 5 marks

5(b) How you will trace the crime which has been happened through email using tool. 5 marks

6 Write a short note on
i) NTFS Disk
ii) Laws related to computer forensic.
5 marks

6 Write a short note on
1) NTFS Disk
2) Lasws related to computer forensic.
5 marks

ADD COMMENTlink
written 5 months ago by gravatar for aniketbab1 aniketbab10
Please log in to add an answer.