Question Paper: Computer Forensic and Cyber Applications : Question Paper Jun 2015 - Computer Engineering (Semester 5) | Pune University (PU)
0

Computer Forensic and Cyber Applications - Jun 2015

Computer Engineering (Semester 5)

TOTAL MARKS: 100
TOTAL TIME: 3 HOURS
(1) Question 1 is compulsory.
(2) Attempt any four from the remaining questions.
(3) Assume data wherever required.
(4) Figures to the right indicate full marks.


Answer any one question from Q1 and Q2

1 (a) Describe the layers of OSI model with suitable diagram.(8 marks) 1 (b) What are the different digital investigation process models? Describe any one.(6 marks) 1 (c) Explain how intruders make use of social engineering & reverse social engineering to achieve their motive.(6 marks) 2 (a) Explain schedule selection & coordination in S-MAC.(8 marks) 2 (b) What types of behaviours are observed in criminal motive. Describe them.(6 marks) 2 (c) Write short note on Investigative Reconstruction in violent crime.(6 marks)


Answer any one question from Q3 and Q4

3 (a) Define Cyber stalking & explain how cyber stalkers operates.(8 marks) 3 (b) Explain the following terms with respect to Reconstruction.
i) Functional Analysis.
ii) Relational Analysis.
(8 marks)
4 (a) Explain the following terms:
i) Private Key Encryption.
ii) Public Key Encryption
(8 marks)
4 (b) Write short note on:
i) File formats & carving
ii) Digital Stratigraphy.
(8 marks)


Answer any one question from Q5 and Q6

5 (a) Describe NTFS File system.(8 marks) 5 (b) Explain how to handle mobile devices as sources of evidence.(8 marks) 6 (a) Describe UNIX file system.(8 marks) 6 (b) Explain in brief Intellectual Property Rights (IPR).(8 marks)


Answer any one question from Q7 and Q8

7 (a) Explain E-mail Forgery & Tracking in detail.(9 marks) 7 (b) Write short note on:
i) Online Anonymity & self-protection.
ii) Searching & Tracking on IRC
(9 marks)
8 (a) How sniffer is placed & configured for preservation, collection & documentation of digital evidence at physical layer.(9 marks) 8 (b) Explain different logs in TCP/IP related digital evidence.(9 marks)

Please log in to add an answer.