Answer any one question from Q1 and Q2
1 (a)
Describe the layers of OSI model with suitable diagram.
8 M
1 (b)
What are the different digital investigation process models? Describe any one.
6 M
1 (c)
Explain how intruders make use of social engineering & reverse social engineering to achieve their motive.
6 M
2 (a)
Explain schedule selection & coordination in S-MAC.
8 M
2 (b)
What types of behaviours are observed in criminal motive. Describe them.
6 M
2 (c)
Write short note on Investigative Reconstruction in violent crime.
6 M
Answer any one question from Q3 and Q4
3 (a)
Define Cyber stalking & explain how cyber stalkers operates.
8 M
3 (b)
Explain the following terms with respect to Reconstruction.
i) Functional Analysis.
ii) Relational Analysis.
i) Functional Analysis.
ii) Relational Analysis.
8 M
4 (a)
Explain the following terms:
i) Private Key Encryption.
ii) Public Key Encryption
i) Private Key Encryption.
ii) Public Key Encryption
8 M
4 (b)
Write short note on:
i) File formats & carving
ii) Digital Stratigraphy.
i) File formats & carving
ii) Digital Stratigraphy.
8 M
Answer any one question from Q5 and Q6
5 (a)
Describe NTFS File system.
8 M
5 (b)
Explain how to handle mobile devices as sources of evidence.
8 M
6 (a)
Describe UNIX file system.
8 M
6 (b)
Explain in brief Intellectual Property Rights (IPR).
8 M
Answer any one question from Q7 and Q8
7 (a)
Explain E-mail Forgery & Tracking in detail.
9 M
7 (b)
Write short note on:
i) Online Anonymity & self-protection.
ii) Searching & Tracking on IRC
i) Online Anonymity & self-protection.
ii) Searching & Tracking on IRC
9 M
8 (a)
How sniffer is placed & configured for preservation, collection & documentation of digital evidence at physical layer.
9 M
8 (b)
Explain different logs in TCP/IP related digital evidence.
9 M
More question papers from Computer Forensic and Cyber Applications