Solve any one question from Q.1(a,b,c) & Q.2(a,b,c)
1(a)
What is switching? Compare packet switching and circuit switching techniques.
8 M
1(b)
Explain Guided transmission media with examples.
6 M
1(c)
Comment on language of computer crime investigaton.
6 M
2(a)
Explain the function of the following network components:
i) Switch
ii)Bridge
iii) Gateways
iv) Repeater
i) Switch
ii)Bridge
iii) Gateways
iv) Repeater
8 M
2(b)
What is modus operandi? Explain with the motives behind it.
6 M
2(c)
Write short note on cyber attacks.
6 M
Solve any one question from Q.3(a,b) & Q.4(a,b)
3(a)
Explain the following with example:
i) Digital evidence as Alibi
ii) Computer intrusion.
i) Digital evidence as Alibi
ii) Computer intrusion.
8 M
3(b)
How will you apply forensic science to computers?
8 M
4(a)
Enlist the important features from Indian IT act with reference to cyber crime and forensics.
8 M
4(b)
Comment on Violent crime and digital evidence.
8 M
Solve any one question from Q.5(a,b) & Q.6(a,b)
5(a)
Compare digital evidence on windows system & Unix systems.
8 M
5(b)
Explain how to handle mobile devices as suource of evidence.
8 M
6(a)
Write short note on:
i) E-mail forgery
ii) Intellactual Property Right (IPR)
i) E-mail forgery
ii) Intellactual Property Right (IPR)
8 M
6(b)
How will you hadle digital evidence on Windows systems?
8 M
Solve any one question from Q.7(a,b) & Q.8(a,b)
7(a)
Enlist the steps for handling digital evidence at various layers.
9 M
7(b)
Write short note on fraud detection in mobile and wireless network.
9 M
8(a)
Explain the network basics for digital investigators.
9 M
8(b)
How will you detect frauds on mobile and wireless devices?
9 M
More question papers from Computer Forensic and Cyber Applications