Answer any one question from Q1 and Q2
1 (a)
Explain following network hardware components
1) Hub
2) Repeater
3) Switch 4) Router
1) Hub
2) Repeater
3) Switch 4) Router
8 M
1 (b)
What are different digital investigation process models ? Describe any one.
6 M
1 (c)
Explain how intruders make use of social engineering and reverse social engineering to achieve their motive
6 M
2 (a)
Explain periodic listen and sleep operation in S-MAC.
8 M
2 (b)
Explain evidence exchange principle with neat diagram.
6 M
2 (c)
Write short note on investigative reconstruction in violent crime.
6 M
Answer any one question from Q3 and Q4
3 (a)
Define Cyber stalking and explain how cyber stalkers operate.
8 M
3 (b)
Explain the following terms with respect to reconstruction.
i) Functional Analysis
ii) Relational Analysis
i) Functional Analysis
ii) Relational Analysis
8 M
4 (a)
Explain the following terms.
i) Private key encryption
ii) Public key encryption
i) Private key encryption
ii) Public key encryption
8 M
4 (b)
Write short note on
i) File formats and carving
ii) Digital stratigraphy
i) File formats and carving
ii) Digital stratigraphy
8 M
Answer any one question from Q5 and Q6
5 (a)
Describe NTFS file system.
8 M
5 (b)
Explain how to handle mobile devices as source of evidence.
8 M
6 (a)
Describe UNIX file system.
8 M
6 (b)
Explain in brief Intellectual Property Rights (IPR).
8 M
Answer any one question from Q7 and Q8
7 (a)
Explain E-mail forgery and tracking in detail.
9 M
7 (b)
Write short note on
i) Online anonymity and self-protection.
ii) Searching and tracking on IRC.
i) Online anonymity and self-protection.
ii) Searching and tracking on IRC.
9 M
8 (a)
Differentiate between static IP address and dynamic IP address.
6 M
8 (b)
Explain different logs in TCP/IP related digital evidence.
9 M
8 (c)
Enlist seven main services provided by internet.
3 M
More question papers from Computer Forensic and Cyber Applications