Solve any one question from Q1 and Q2
1 (a)
Explain schedule selection & coordination of sensor MAC.
8 M
1 (b)
Explain staircase digital investigation process model with diagram.
6 M
1 (c)
Describe in brief how computer intenders operate.
6 M
2 (a)
Define network topology & explain various network topologies.
9 M
2 (b)
Describe four fundamental principles of handling digital crime scenes.
6 M
2 (c)
Explain need of crime scene survey & documentation.
5 M
Solve any one question from Q3 and Q4
3 (a) (i)
Explain:
Private key Encryption.
Private key Encryption.
5 M
3 (a) (ii)
Explain:
Public key Encryption.
Public key Encryption.
5 M
3 (b)
Write short note on preservation of Hardware as a Digital Evidence.
8 M
4 (a)
Write a short note on Cyber Stalking & Cyber stalkers?
8 M
4 (b)
Write a short note on:
Anonymity & Surreptitious Monitoring with respect to cyber stalking.
Anonymity & Surreptitious Monitoring with respect to cyber stalking.
8 M
Solve any one question from Q5 and Q6
5 (a)
Explain patents, copyrights, trademarks in detail.
8 M
5 (b)
Explain in detail types of evidences on mobile devices.
8 M
6 (a)
Write a short note on file system traces on UNIX.
8 M
6 (b)
Explain NTFS file system.
8 M
Solve any one question from Q7 and Q8
7 (a) (i)
Explain:
Ethernet.
Ethernet.
5 M
7 (a) (ii)
Explain:
ATM Networks.
ATM Networks.
5 M
7 (b)
Explain authentication & operating system logs in TCP/IP related digital evidence.
9 M
8 (a)
What is email forgery & tracking?
9 M
8 (b)
Explain different Internet Services and justify Internet as an Investigative Tool.
9 M
More question papers from Computer Forensic and Cyber Applications