SPPU Computer Engineering (Semester 5)
Computer Forensic and Cyber Applications
June 2015
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


Answer any one question from Q1 and Q2
1 (a) Describe the layers of OSI model with suitable diagram.
8 M
1 (b) What are the different digital investigation process models? Describe any one.
6 M
1 (c) Explain how intruders make use of social engineering & reverse social engineering to achieve their motive.
6 M

2 (a) Explain schedule selection & coordination in S-MAC.
8 M
2 (b) What types of behaviours are observed in criminal motive. Describe them.
6 M
2 (c) Write short note on Investigative Reconstruction in violent crime.
6 M

Answer any one question from Q3 and Q4
3 (a) Define Cyber stalking & explain how cyber stalkers operates.
8 M
3 (b) Explain the following terms with respect to Reconstruction.
i) Functional Analysis.
ii) Relational Analysis.
8 M

4 (a) Explain the following terms:
i) Private Key Encryption.
ii) Public Key Encryption
8 M
4 (b) Write short note on:
i) File formats & carving
ii) Digital Stratigraphy.
8 M

Answer any one question from Q5 and Q6
5 (a) Describe NTFS File system.
8 M
5 (b) Explain how to handle mobile devices as sources of evidence.
8 M

6 (a) Describe UNIX file system.
8 M
6 (b) Explain in brief Intellectual Property Rights (IPR).
8 M

Answer any one question from Q7 and Q8
7 (a) Explain E-mail Forgery & Tracking in detail.
9 M
7 (b) Write short note on:
i) Online Anonymity & self-protection.
ii) Searching & Tracking on IRC
9 M

8 (a) How sniffer is placed & configured for preservation, collection & documentation of digital evidence at physical layer.
9 M
8 (b) Explain different logs in TCP/IP related digital evidence.
9 M



More question papers from Computer Forensic and Cyber Applications
SPONSORED ADVERTISEMENTS