MU Computer Engineering (Semester 8)
Digital Forensics
December 2016
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1(a) What do you mean by incident reponse methodology? Explain all components of it.
10 M
1(b) What do you mean by digital evidence? What are the challenges involved in evidence handling?
10 M

2(a) List ans explain in brief steps taken to collect live data from UNIX system.
10 M
2(b) Explain procedure to inevestigate routers.
10 M

3(a) Explain the terms:
i) DMCA ii) CFAA iii) CANSpam
10 M
3(b) What are the steps involved in forensic analysis? Explain each in brief.
10 M

4(a) What are various hacking tools? Explain any two in details.
10 M
4(b) Explain the bodies of law. Explain the levels of law.
10 M

5(a) Write the differences between:
i) netcat and cryptcat ii) Virus and Worms.
10 M
5(b) Explain procedure for recording crytographic checksums of critical files. What are the advantages of it?
10 M

Solve any four questionQ.6(a,b,c,d,e,f)
6(a) Write short notes on Evidence Validation.
5 M
6(b) Explain the terms: Forensic Duplicate, Qualified Forensic Duplicate.
5 M
6(c) Write short notes on internet Fraud.
5 M
6(d) Explain techniques used to recover the deleted files.
5 M
6(e) Explain the storage layer of the file system.
5 M
6(f) Explain levels of culpability.
5 M



More question papers from Digital Forensics
SPONSORED ADVERTISEMENTS