0% found this document useful (0 votes)
32 views2 pages

May Jun 2023

The document discusses topics related to cyber security and digital forensics. It provides instructions for answering 8 questions, with each question having 2 parts. The questions cover various topics such as computer forensic services and applications in the military, data recovery techniques, legal aspects of digital evidence collection, chain of custody procedures, approaches for validating and seizing digital evidence, identifying digital evidence, network forensics, computer forensic software and hardware tools, investigating email crimes, and NIST forensic technology standards.

Uploaded by

harishusmant2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views2 pages

May Jun 2023

The document discusses topics related to cyber security and digital forensics. It provides instructions for answering 8 questions, with each question having 2 parts. The questions cover various topics such as computer forensic services and applications in the military, data recovery techniques, legal aspects of digital evidence collection, chain of custody procedures, approaches for validating and seizing digital evidence, identifying digital evidence, network forensics, computer forensic software and hardware tools, investigating email crimes, and NIST forensic technology standards.

Uploaded by

harishusmant2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Total No. of Questions : 8] SEAT No.

8
23
P550 [Total No. of Pages : 2

ic-
[6004]-485

tat
B.E. (Computer Engineering)

8s
CYBER SECURITY AND DIGITAL FORENSICS

2:4
02 91
(2019 Pattern) (Semester - VII) (Elective - III) (410244C)

4:4
0
31
4/0 13
Time : 2½ Hours] [Max. Marks : 70
0
6/2
Instructions to the candidates:
.23 GP

1) Answer Q.1 or Q.2, Q.3 or Q.4, Q.5 or Q.6, Q.7 or Q.8.


2) Neat diagrams must be drawn wherever necessary.
E
82

8
C

3) Figures to the right indicate full marks.

23
ic-
4) Use of Calculator is allowed.
16

tat
5) Assume suitable data if necessary.
8.2

8s
.24

2:4
Q1) a) Explain in brief computer forensic services. Write the applications of
91
49

4:4
digital forensics in military. [8]
30
31

b) What is the significance of data recovery and backup? Explain various


01

data recovery solutions.


02

[9]
6/2

OR
GP
4/0

Q2) a) What are the various business oriented digital forensic techniques? [8]
CE
82

8
b) How does computer forensics help in law enforcement? [9]

23
.23

ic-
16

tat
Q3) a) Discuss the various legal aspects of collecting and storing digital evidence.[9]
8.2

8s

b) What are different computer evidence processing steps? [9]


.24

2:4
91

OR
49

4:4
30

Q4) a) What is chain custody? How we can control the contamination of digital
31

evidence? [9]
01
02

b) What are various methods of collecting digital evidence ?Enlist the various
6/2
GP

digital collection steps. [9]


4/0
CE
82

Q5) a) Explain different approaches for validating forensic data. [9]


.23

b) Explain the approaches for seizing digital evidence at the crime scene.[8]
16
8.2

OR
.24
49

P.T.O.
Q6) a) Explain the process of identifying digital evidence in computer forensics.[9]

8
23
b) Explain Network forensics and order of volatility for computer system.[8]

ic-
tat
8s
Q7) a) State the features of any five computer forensic software tools. [9]

2:4
b) Write short notes on [9]

02 91
4:4
i) Task performed by digital forensic tool

0
31
ii)
4/0 13
Tools for email forensics
0
6/2
iii) Techniques for email forensic investigation
.23 GP

OR
E
82

8
C

Q8) a) State the features of any five computer forensic hardware tools. [9]

23
ic-
b) Write short notes on [9]
16

tat
8.2

i) Role of client and server in email

8s
.24

2:4
ii) Investigating Email crimes and investigations
91
49

4:4
iii) NIST standards for forensic technologies
30
31
01
02
6/2
GP


4/0
CE
82

8
23
.23

ic-
16

tat
8.2

8s
.24

2:4
91
49

4:4
30
31
01
02
6/2
GP
4/0
CE
82
.23
16
8.2
.24

[6004]-485 2
49

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy