SPPU Computer Engineering (Semester 5)
Computer Forensic and Cyber Applications
December 2014
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


Answer any one question from Q1 and Q2
1 (a) Explain following network hardware components
1) Hub
2) Repeater
3) Switch 4) Router
8 M
1 (b) What are different digital investigation process models ? Describe any one.
6 M
1 (c) Explain how intruders make use of social engineering and reverse social engineering to achieve their motive
6 M

2 (a) Explain periodic listen and sleep operation in S-MAC.
8 M
2 (b) Explain evidence exchange principle with neat diagram.
6 M
2 (c) Write short note on investigative reconstruction in violent crime.
6 M

Answer any one question from Q3 and Q4
3 (a) Define Cyber stalking and explain how cyber stalkers operate.
8 M
3 (b) Explain the following terms with respect to reconstruction.
i) Functional Analysis
ii) Relational Analysis
8 M

4 (a) Explain the following terms.
i) Private key encryption
ii) Public key encryption
8 M
4 (b) Write short note on
i) File formats and carving
ii) Digital stratigraphy
8 M

Answer any one question from Q5 and Q6
5 (a) Describe NTFS file system.
8 M
5 (b) Explain how to handle mobile devices as source of evidence.
8 M

6 (a) Describe UNIX file system.
8 M
6 (b) Explain in brief Intellectual Property Rights (IPR).
8 M

Answer any one question from Q7 and Q8
7 (a) Explain E-mail forgery and tracking in detail.
9 M
7 (b) Write short note on
i) Online anonymity and self-protection.
ii) Searching and tracking on IRC.
9 M

8 (a) Differentiate between static IP address and dynamic IP address.
6 M
8 (b) Explain different logs in TCP/IP related digital evidence.
9 M
8 (c) Enlist seven main services provided by internet.
3 M



More question papers from Computer Forensic and Cyber Applications
SPONSORED ADVERTISEMENTS