1(a)
What is incident response? Explain goals of incident response.
5 M
1(a)
What is incident response? Explain goals of incident response.
5 M
1(b)
Explain the term Cyber terrorism with examples.
5 M
1(b)
Explain the term Cyber terrorism with examples.
5 M
1(c)
What is Evidence? Explain the types of Evidence.
5 M
1(c)
What is Evidence? Explain the types of Evidence.
5 M
1(d)
What is DOS attack? How to acheive recovery from DOS attack?
5 M
1(d)
What is DOS attack? How to achieve recovery from DOS attack?
5 M
2(a)
Explain volatile data collection procedure for Windows system.
10 M
2(a)
Explain volatile data collection procedure for Windows system.
10 M
2(b)
What are possible investigation phase carried out in Data Collection and Analysis.
10 M
2(b)
What are possible investigation phase carried out in Data Collections and Analysis.
10 M
3(a)
Explain Incident Response Methodology in detail.
10 M
3(a)
Explain Incident Response Methodology in detail.
10 M
3(b)
What are the steps involved in computer evidence handling? Explain in detail.
10 M
3(b)
What are the steps involved in computer evidence handling? Explain in detail.
10 M
4(a)
Explain importance of forensic duplication and its methods.
10 M
4(a)
Explain Importance of forensic duplicaiton and its methods.
10 M
4(b)
Describe levels of culpability.
10 M
4(b)
Describe levels of culpability.
10 M
5(a)
Explain various ethical issues concern in computer forensics.
10 M
5(a)
Explain various ethical issues concern in computer forensics.
10 M
5(b)
How you will trace the crime which has been happened through email. Using tool.
10 M
5(b)
How you will trace the crime which has been happened through email using tool.
10 M
6
Write a short note on
i) NTFS Disk
ii) Laws related to computer forensic.
i) NTFS Disk
ii) Laws related to computer forensic.
20 M
6
Write a short note on
1) NTFS Disk
2) Lasws related to computer forensic.
1) NTFS Disk
2) Lasws related to computer forensic.
20 M
More question papers from Digital Forensics