Solve any one question from Q.1(a,b,c) &Q.2(a,b,c)
1(a)
Explain in brief Indian IT Act.
8 M
1(b)
What are different digital investigation process models? Describe any one.
6 M
1(c)
Enlist the differences between switch and router.
6 M
2(a)
Describe transmission media with example.
8 M
2(b)
What is victimology? Explain with example.
6 M
2(c)
How intruders make use of social engineering and reverse social engineering to achieve their motive?
6 M
Solve any one question from Q.3(a,b) &Q.4(a,b)
3(a)
Explain different types of cyber stalker with example cases.
8 M
3(b)
Explain different steps used examining the computer crime and prepare a investigation case for "Mouse theft from college lab".
8 M
4(a)
What is cyber stalking? Explain how cyber stalker operates.
8 M
4(b)
Explain the process of investigate reconstruction in case of violent crime
8 M
Solve any one question from Q.5(a,b) &Q.6(a,b)
5(a)
Describe NTFS file system.
8 M
5(b)
How to handle mobile devices as source of evidence?
8 M
6(a)
Compare digital evidence on windows system & Unix systems.
8 M
6(b)
Explain in brief Intellectual Property Rights (IPR).
8 M
Solve any one question from Q.7(a,b) &Q.8(a,b)
7(a)
What are the services provided by internet? Differentiate between static IP address and dynamic IP address.
9 M
7(b)
Write short note on fraud detection in mobile and wireless network.
9 M
8(a)
Explain E-mail forgery and tracking in detail.
9 M
8(b)
Enlist the steps applied in forensic science to the Networks.
9 M
More question papers from Computer Forensic and Cyber Applications