SPPU Computer Engineering (Semester 5)
Computer Forensic and Cyber Applications
December 2016
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


Solve any one question from Q.1(a,b,c) & Q.2(a,b,c)
1(a) What is switching? Compare packet switching and circuit switching techniques.
8 M
1(b) Explain Guided transmission media with examples.
6 M
1(c) Comment on language of computer crime investigaton.
6 M

2(a) Explain the function of the following network components:
i) Switch
ii)Bridge
iii) Gateways
iv) Repeater
8 M
2(b) What is modus operandi? Explain with the motives behind it.
6 M
2(c) Write short note on cyber attacks.
6 M

Solve any one question from Q.3(a,b) & Q.4(a,b)
3(a) Explain the following with example:
i) Digital evidence as Alibi
ii) Computer intrusion.
8 M
3(b) How will you apply forensic science to computers?
8 M

4(a) Enlist the important features from Indian IT act with reference to cyber crime and forensics.
8 M
4(b) Comment on Violent crime and digital evidence.
8 M

Solve any one question from Q.5(a,b) & Q.6(a,b)
5(a) Compare digital evidence on windows system & Unix systems.
8 M
5(b) Explain how to handle mobile devices as suource of evidence.
8 M

6(a) Write short note on:
i) E-mail forgery
ii) Intellactual Property Right (IPR)
8 M
6(b) How will you hadle digital evidence on Windows systems?
8 M

Solve any one question from Q.7(a,b) & Q.8(a,b)
7(a) Enlist the steps for handling digital evidence at various layers.
9 M
7(b) Write short note on fraud detection in mobile and wireless network.
9 M

8(a) Explain the network basics for digital investigators.
9 M
8(b) How will you detect frauds on mobile and wireless devices?
9 M



More question papers from Computer Forensic and Cyber Applications
SPONSORED ADVERTISEMENTS