MU Computer Engineering (Semester 8)
Total marks: 80
Total time: 3 Hours
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary
1(a) What is incident response? Explain goals of incident response.
5 marks
5470
1(b) What is incident response? Explain goals of incident response.
5 marks
5471
1(b) Explain the term Cyber terrorism with examples.
5 marks
5477
1(c) What is Evidence? Explain the types of Evidence.
5 marks
5492
1(d) What is DOS attack? How to acheive recovery from DOS attack?
5 marks
5509
2(a) Explain volatile data collection procedure for Windows system.
5 marks
00
2(b) What are possible investigation phase carried out in Data Collection and Analysis.
5 marks
00
3(a) Explain Incident Response Methodology in detail.
5 marks
00
3(b) What are the steps involved in computer evidence handling? Explain in detail.
5 marks
5495
4(a) Explain importance of forensic duplication and its methods.
5 marks
5480
4(b) Describe levels of culpability.
5 marks
5512
5(a) Explain various ethical issues concern in computer forensics.
5 marks
00
5(b) How you will trace the crime which has been happened through email. Using tool.
5 marks
00
6 Write a short note on
i) NTFS Disk
ii) Laws related to computer forensic.
5 marks
5489