SPPU Computer Engineering (Semester 5)
Computer Forensic and Cyber Applications
May 2017
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


Solve any one question from Q.1(a,b,c) &Q.2(a,b,c)
1(a) Explain in brief Indian IT Act.
8 M
1(b) What are different digital investigation process models? Describe any one.
6 M
1(c) Enlist the differences between switch and router.
6 M

2(a) Describe transmission media with example.
8 M
2(b) What is victimology? Explain with example.
6 M
2(c) How intruders make use of social engineering and reverse social engineering to achieve their motive?
6 M

Solve any one question from Q.3(a,b) &Q.4(a,b)
3(a) Explain different types of cyber stalker with example cases.
8 M
3(b) Explain different steps used examining the computer crime and prepare a investigation case for "Mouse theft from college lab".
8 M

4(a) What is cyber stalking? Explain how cyber stalker operates.
8 M
4(b) Explain the process of investigate reconstruction in case of violent crime
8 M

Solve any one question from Q.5(a,b) &Q.6(a,b)
5(a) Describe NTFS file system.
8 M
5(b) How to handle mobile devices as source of evidence?
8 M

6(a) Compare digital evidence on windows system & Unix systems.
8 M
6(b) Explain in brief Intellectual Property Rights (IPR).
8 M

Solve any one question from Q.7(a,b) &Q.8(a,b)
7(a) What are the services provided by internet? Differentiate between static IP address and dynamic IP address.
9 M
7(b) Write short note on fraud detection in mobile and wireless network.
9 M

8(a) Explain E-mail forgery and tracking in detail.
9 M
8(b) Enlist the steps applied in forensic science to the Networks.
9 M



More question papers from Computer Forensic and Cyber Applications
SPONSORED ADVERTISEMENTS