SPPU Computer Engineering (Semester 5)
Computer Forensic and Cyber Applications
December 2015
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


Solve any one question from Q1 and Q2
1 (a) Explain schedule selection & coordination of sensor MAC.
8 M
1 (b) Explain staircase digital investigation process model with diagram.
6 M
1 (c) Describe in brief how computer intenders operate.
6 M

2 (a) Define network topology & explain various network topologies.
9 M
2 (b) Describe four fundamental principles of handling digital crime scenes.
6 M
2 (c) Explain need of crime scene survey & documentation.
5 M

Solve any one question from Q3 and Q4
3 (a) (i) Explain:
Private key Encryption.
5 M
3 (a) (ii) Explain:
Public key Encryption.
5 M
3 (b) Write short note on preservation of Hardware as a Digital Evidence.
8 M

4 (a) Write a short note on Cyber Stalking & Cyber stalkers?
8 M
4 (b) Write a short note on:
Anonymity & Surreptitious Monitoring with respect to cyber stalking.
8 M

Solve any one question from Q5 and Q6
5 (a) Explain patents, copyrights, trademarks in detail.
8 M
5 (b) Explain in detail types of evidences on mobile devices.
8 M

6 (a) Write a short note on file system traces on UNIX.
8 M
6 (b) Explain NTFS file system.
8 M

Solve any one question from Q7 and Q8
7 (a) (i) Explain:
Ethernet.
5 M
7 (a) (ii) Explain:
ATM Networks.
5 M
7 (b) Explain authentication & operating system logs in TCP/IP related digital evidence.
9 M

8 (a) What is email forgery & tracking?
9 M
8 (b) Explain different Internet Services and justify Internet as an Investigative Tool.
9 M



More question papers from Computer Forensic and Cyber Applications
SPONSORED ADVERTISEMENTS