0
Computer Forensic and Cyber Applications : Question Paper Jun 2015 - Computer Engineering (Semester 5) | Pune University (PU)

Computer Forensic and Cyber Applications - Jun 2015

Computer Engineering (Semester 5)

TOTAL MARKS: 100
TOTAL TIME: 3 HOURS
(1) Question 1 is compulsory.
(2) Attempt any four from the remaining questions.
(3) Assume data wherever required.
(4) Figures to the right indicate full marks.


Answer any one question from Q1 and Q2

1 (a) Describe the layers of OSI model with suitable diagram.(8 marks) 1 (b) What are the different digital investigation process models? Describe any one.(6 marks) 1 (c) Explain how intruders make use of social engineering & reverse social engineering to achieve their motive.(6 marks) 2 (a) Explain schedule selection & coordination in S-MAC.(8 marks) 2 (b) What types of behaviours are observed in criminal motive. Describe them.(6 marks) 2 (c) Write short note on Investigative Reconstruction in violent crime.(6 marks)


Answer any one question from Q3 and Q4

3 (a) Define Cyber stalking & explain how cyber stalkers operates.(8 marks) 3 (b) Explain the following terms with respect to Reconstruction.
i) Functional Analysis.
ii) Relational Analysis.
(8 marks)
4 (a) Explain the following terms:
i) Private Key Encryption.
ii) Public Key Encryption
(8 marks)
4 (b) Write short note on:
i) File formats & carving
ii) Digital Stratigraphy.
(8 marks)


Answer any one question from Q5 and Q6

5 (a) Describe NTFS File system.(8 marks) 5 (b) Explain how to handle mobile devices as sources of evidence.(8 marks) 6 (a) Describe UNIX file system.(8 marks) 6 (b) Explain in brief Intellectual Property Rights (IPR).(8 marks)


Answer any one question from Q7 and Q8

7 (a) Explain E-mail Forgery & Tracking in detail.(9 marks) 7 (b) Write short note on:
i) Online Anonymity & self-protection.
ii) Searching & Tracking on IRC
(9 marks)
8 (a) How sniffer is placed & configured for preservation, collection & documentation of digital evidence at physical layer.(9 marks) 8 (b) Explain different logs in TCP/IP related digital evidence.(9 marks)

0  upvotes

Next up

Read More Questions

If you are looking for answer to specific questions, you can search them here. We'll find the best answer for you.

Search

Study Full Subject

If you are looking for good study material, you can checkout our subjects. Hundreds of important topics are covered in them.

Know More