written 8.7 years ago by |
Computer Forensic and Cyber Applications - Jun 2015
Computer Engineering (Semester 5)
TOTAL MARKS: 100
TOTAL TIME: 3 HOURS
(1) Question 1 is compulsory.
(2) Attempt any four from the remaining questions.
(3) Assume data wherever required.
(4) Figures to the right indicate full marks.
Answer any one question from Q1 and Q2
1 (a) Describe the layers of OSI model with suitable diagram.(8 marks) 1 (b) What are the different digital investigation process models? Describe any one.(6 marks) 1 (c) Explain how intruders make use of social engineering & reverse social engineering to achieve their motive.(6 marks) 2 (a) Explain schedule selection & coordination in S-MAC.(8 marks) 2 (b) What types of behaviours are observed in criminal motive. Describe them.(6 marks) 2 (c) Write short note on Investigative Reconstruction in violent crime.(6 marks)
Answer any one question from Q3 and Q4
3 (a) Define Cyber stalking & explain how cyber stalkers operates.(8 marks)
3 (b) Explain the following terms with respect to Reconstruction.
i) Functional Analysis.
ii) Relational Analysis.(8 marks)
4 (a) Explain the following terms:
i) Private Key Encryption.
ii) Public Key Encryption(8 marks)
4 (b) Write short note on:
i) File formats & carving
ii) Digital Stratigraphy.(8 marks)
Answer any one question from Q5 and Q6
5 (a) Describe NTFS File system.(8 marks) 5 (b) Explain how to handle mobile devices as sources of evidence.(8 marks) 6 (a) Describe UNIX file system.(8 marks) 6 (b) Explain in brief Intellectual Property Rights (IPR).(8 marks)
Answer any one question from Q7 and Q8
7 (a) Explain E-mail Forgery & Tracking in detail.(9 marks)
7 (b) Write short note on:
i) Online Anonymity & self-protection.
ii) Searching & Tracking on IRC(9 marks)
8 (a) How sniffer is placed & configured for preservation, collection & documentation of digital evidence at physical layer.(9 marks)
8 (b) Explain different logs in TCP/IP related digital evidence.(9 marks)