May Jun 2023
May Jun 2023
8
23
P550 [Total No. of Pages : 2
ic-
[6004]-485
tat
B.E. (Computer Engineering)
8s
CYBER SECURITY AND DIGITAL FORENSICS
2:4
02 91
(2019 Pattern) (Semester - VII) (Elective - III) (410244C)
4:4
0
31
4/0 13
Time : 2½ Hours] [Max. Marks : 70
0
6/2
Instructions to the candidates:
.23 GP
8
C
23
ic-
4) Use of Calculator is allowed.
16
tat
5) Assume suitable data if necessary.
8.2
8s
.24
2:4
Q1) a) Explain in brief computer forensic services. Write the applications of
91
49
4:4
digital forensics in military. [8]
30
31
[9]
6/2
OR
GP
4/0
Q2) a) What are the various business oriented digital forensic techniques? [8]
CE
82
8
b) How does computer forensics help in law enforcement? [9]
23
.23
ic-
16
tat
Q3) a) Discuss the various legal aspects of collecting and storing digital evidence.[9]
8.2
8s
2:4
91
OR
49
4:4
30
Q4) a) What is chain custody? How we can control the contamination of digital
31
evidence? [9]
01
02
b) What are various methods of collecting digital evidence ?Enlist the various
6/2
GP
b) Explain the approaches for seizing digital evidence at the crime scene.[8]
16
8.2
OR
.24
49
P.T.O.
Q6) a) Explain the process of identifying digital evidence in computer forensics.[9]
8
23
b) Explain Network forensics and order of volatility for computer system.[8]
ic-
tat
8s
Q7) a) State the features of any five computer forensic software tools. [9]
2:4
b) Write short notes on [9]
02 91
4:4
i) Task performed by digital forensic tool
0
31
ii)
4/0 13
Tools for email forensics
0
6/2
iii) Techniques for email forensic investigation
.23 GP
OR
E
82
8
C
Q8) a) State the features of any five computer forensic hardware tools. [9]
23
ic-
b) Write short notes on [9]
16
tat
8.2
8s
.24
2:4
ii) Investigating Email crimes and investigations
91
49
4:4
iii) NIST standards for forensic technologies
30
31
01
02
6/2
GP
4/0
CE
82
8
23
.23
ic-
16
tat
8.2
8s
.24
2:4
91
49
4:4
30
31
01
02
6/2
GP
4/0
CE
82
.23
16
8.2
.24
[6004]-485 2
49