1(a)
What do you mean by incident reponse methodology? Explain all components of it.
10 M
1(b)
What do you mean by digital evidence? What are the challenges involved in evidence handling?
10 M
2(a)
List ans explain in brief steps taken to collect live data from UNIX system.
10 M
2(b)
Explain procedure to inevestigate routers.
10 M
3(a)
Explain the terms:
i) DMCA ii) CFAA iii) CANSpam
i) DMCA ii) CFAA iii) CANSpam
10 M
3(b)
What are the steps involved in forensic analysis? Explain each in brief.
10 M
4(a)
What are various hacking tools? Explain any two in details.
10 M
4(b)
Explain the bodies of law. Explain the levels of law.
10 M
5(a)
Write the differences between:
i) netcat and cryptcat ii) Virus and Worms.
i) netcat and cryptcat ii) Virus and Worms.
10 M
5(b)
Explain procedure for recording crytographic checksums of critical files. What are the advantages of it?
10 M
Solve any four questionQ.6(a,b,c,d,e,f)
6(a)
Write short notes on Evidence Validation.
5 M
6(b)
Explain the terms: Forensic Duplicate, Qualified Forensic Duplicate.
5 M
6(c)
Write short notes on internet Fraud.
5 M
6(d)
Explain techniques used to recover the deleted files.
5 M
6(e)
Explain the storage layer of the file system.
5 M
6(f)
Explain levels of culpability.
5 M
More question papers from Digital Forensics