Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Fir Cat 1 Questions

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Reg.

No: olSo9 3
Question Paper Code: 1911TE804T

B.E/ B.Tech DEGREE CONTINUOUSASSESSMENT TEST-I, February. 2024


Eighth Semester
Department of Information Technology
191/TE804T - Forensics and Incident Response
Regulations 2019

Time: 90 minutes Maximum: 50Marks


Course Outcomes: The Student will be able to
CO1: Apply the basics of computer forensics and its terminologies using protocols.
CO2: Analyze the security issues in network and transport layer by firewalls.
CO3: Build Cyber Forensics technique to find the digital forensics.
C04: Evaluate the units and network traffic using forensics tools.
CO5: Compare and validate forensics data in cyber security.
CO6: Bvaluate the Investigations techniques to handle ethical issues.
K1 - Remember K2 -Understand K3 - Apply K4- Analyse K5 - Evaluate K6 - Create

Answer ALL Questions.


PART A-(10x 1=10 marks)
In tunnel mode, IPSec protects the.
a) Entire IP packet CO1 KI
1. b) IP header
c) IP payload
d) IP trailer
IKE uses
a) SKEMA CO1 K2
2 b) Oakley
c) ISAKMS
d) No key
SSL primarily focuses on
a) integrity and authenticity CO1 KI
3 b) integrity and non-repudiation
) authenticity and privacy
d) confidentiality and integrity
ESP does not provide
a) source authentication
4. b) data integrity CO1 K1
c) privacy
d) error control
In the layer of 0SImodcl, packet filtering firewalls are implemented
a) Application layer
5. b) Session layer CO2 K1
c) Presentation layer
d) Network layer
What is the key size allowed in PGP?
a) 1024-1056
6 b) 1024-4056 CO2 K2

c) 1024.4096
d) 1024-2048
SET stands for.
a) set Ecommerce transaction
7. b) secure Ecommerce transaction CO2 K1

c) set electronics transaction


d) secure electronic transaction
Network administrators can create their own ACL rules based on
and
a) Address, Protocols and Packet attributes
8 CO2 K2
b) Address, Protocols and security policies
c) Address, policies and Packet attributes
d) Network topology, Protocols and data packets
Damaging or destroying data rather than stealing is called as
a) Piracy
9 b) DOS attack CO3 K1
c) Phishing
d) Computer Vandalism
Any program or procedure that makes unauthorized actions is called
a) Threat
10. b) Malicious Code CO3 Ki
c) Denial-of-Service
d) Attack
PART B (5 x 2 =10 marks)
11. What is Cryptographic computation?
C01 K
12. Differentiate tunnel mode and transport mode in IP security? COI
13. Outline the general format for PGP message? CO2 K2
14. Sketch the header fields define in MIME? C02
K3
15. Define the term "Computer Forensics". CO3

PART C-(3x 10 =30 marks)


Compulsory Question
Could you provide a detailed explanation of the fundamental components
16. comprising the Transport Layer Security (TLS) protocol? Elaborate on each
component's role and functionality, emphasizing how they collectively contribute CO1 K4
to establishing secure communication over the internet.
Answer any 2 of the following questions
17. Formulate and design the operations involved in Encapsulating security payload
and Authentication header. CO1 K3

Imagine you're conducting an online purchase using Secure Electronic


18. Transactions (SET). Walk me through the process of how dual signature CO2 K4
creation and verification occur in this scenario.
Elaborate the concepts of identity theft and identity fraud, highlighting their
distinctions and potential impacts on individuals and organizations?
19. Additionally, could you provide insights into the role of Incident Response (IR) CO3 K4
toolkits in mitigating and managing the aftermath of identity-related cyber
incidents?

You might also like