0% found this document useful (0 votes)
107 views

CSDF Question Paper

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views

CSDF Question Paper

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Total No. of Questions : 8] SEAT No.

8
23
P-6556 [Total No. of Pages : 2

ic-
tat
[6181]-106

0s
5:3
B.E. (Computer Engineering)

02 91
3:4
CYBER SECURITY AND DIGITAL FORENSICS

0
31
7/1 13
(2019 Pattern) (Semester - VII) (410244 C) (Elective - III)
0
2/2
Time : 2½ Hours] [Max. Marks : 70
.23 GP

Instructions to the candidates :


E
80

1) Answer Q.1 or Q.2, Q.3 or Q.4, Q.5 or Q.6, Q.7 or Q.8.

8
C

23
2) Neat diagrams must be drawn wherever necessary.

ic-
3) Figures to the right indicate full marks.
16

tat
4) Assume suitable data, if necessary.
8.2

0s
.24

5:3
91
49

Q1) a) What are the typical steps followed by computer forensics specialists in
3:4
30

an investigation? Explain any 2 in detail. [9]


31

b) In what ways can business benefit from computer forensics technology?


01
02

Explain in detail. [9]


2/2
GP

OR
7/1
CE

Q2) a) What kind of digital evidences can be collected in computer forensics?


80

8
23
Explain in detail. [9]
.23

b) Why is data backup & recovery important in computer forensics? [9] ic-
16

tat
8.2

0s
.24

Q3) a) What is the primary purpose of collecting evidence in digital forensics?


5:3
91

Explain in detail. [9]


49

3:4
30

b) What are the typical steps involved in the collection of digital evidences?
31

[8]
01
02

OR
2/2
GP

Q4) a) Explain the different types of digital evidence that can be collected in
7/1
CE

computer forensics? [8]


80

b) What method & techniques are commonly used to verify & authenticate
.23

computer images. explain any two in detail? [9]


16
8.2

P.T.O.
.24
49
Q5) a) How do investigators determine which data is relevant to collect & analyze

8
23
in digital forensics investigation? [8]

ic-
b) What is the honeynet project, how does it contribute to network

tat
forensics? [9]

0s
OR

5:3
Q6) a) Why is data validation crucial in digital forensics & what methods are

02 91
3:4
commelily used for data validation? [8]

0
31
b) 7/1 13
Describe the process of seizing digital evidence at a crime or incident
scene? [9]
0
2/2
.23 GP
E

Q7) a) How does email play a significant role in digital investigations? What
80

8
C

23
types of information can be obtain from email Header that may be relevant

ic-
in investigations? [9]
16

tat
b) What factors should be considered when evaluating computer forensics
8.2

0s
tool needs for an investigations. Explain any two in detail? [9]
.24

5:3
91
49

OR
3:4
30
31

Q8) a) What is function e-mail server, how does it store & manage e-mail data?
01

[9]
02
2/2
GP

b) Write short note (any one) : [9]


7/1

i) e-mail forensics tools.


CE
80

8
23
ii) Computer forensics hardware tools
.23

ic-
16

tat

8.2

0s
.24

5:3
91
49

3:4
30
31
01
02
2/2
GP
7/1
CE
80
.23
16
8.2
.24

[6181]-106 2
49

You might also like