Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
4 views1 page

Csdf part 2

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 1

FA

E2

60
E4
70
Paper / Subject Code: 70731 / Elective IV : Cyber Security & Digital Forensics

93

80

E8
28
53

0C

48

60
1T00163 - M.C.A. (SEM-III) (Choice Based) ( Two Year Course) / 70731 - Elective IV :

3E
97

F
8E

80

E8
37
Cyber Security & Digital Forensics

3E

C9

E2

48
75

60
QP CODE: 10033178 DATE: 03/08/2023

AD

70

E
E9

93

80
8
53
E3
(3 Hours) [Total Marks: 80]

8
3

4
D

97

0
CB

8E
3
7
A

9
3
E3

0C

E2
D3

5
A3
N.B.: (1) Question No.1 is compulsory

4
7
CB

8E
9

93
37
A
8F

E
E3

0C

E2
D3

75
3
0E
(2) Attempt any THREE Questions between Question No.2 to 6

93
7
3A
8F
06

E
C

0C
3

5
3
88

AD

7
A
0

7
E4

F
6

3E
C

53
Q1. Answer ANY FOUR out of FIVE questions. (20)

3
A3
28

0E

AD

97

0
48

37
3E

F
06

E
C
8E

E8

E3
a) Indian ITA- 2000.

D3

75
A3
C9

88
2

E9
3A
3E

E4

8F
6
70

C
b) Industrial Espionage

D3
3
C9

0E
53

E
FA
2

3A
E

4
97

06
70
c) Credit Card Frauds.

3C
E
3

8
3E

28

88

E
53

BE

AD
FA
0C

0
d) Key loggers and Spywares

3E

4
AD

C
8E
E9

E8
37

E3
A3
9

88
E3

2
3

5
e) Challenges in Computer Forensics

60

CB
E

E4
D

97

8F
70
CB

80
A

A3
E

28

E
3
E3

48
D3

0
A3

3E
7

8F
06
0
CB

8E
9

7
3A
8F

Q2.

9
(20)

88

0E
53

2
3
A3
0E

BE

E4
AD

97

06
0

3
37
A. Discuss in detail the classification of cybercrime.
8F
06

C9

28
C

88
3

5
3
88

0E

BE

3E

E4
AD

70
A

B. What is the different between virus and worms? Discuss the different types of viruses
9
E4

8F
06

C9

28
C

53
3

D3
A3
28

88

0E

3E
97

70
B

3A
3E

E4

8F
06

C9
3C

3
D3

5
C9

28

88

BE

Q3. (20)
7

70
FA
60

E9
3A
3E

E4
70

53
0

D3
A. What is the need for digital forensic? Illustrate Digital Forensic process with diagram.
3
C9

28

0E
53

97
FA
8

3A
3E

E4
7

06
70

3E
C
E9

B. Define SQL injection? What are the steps for SQL Injection?
8

A3
C9

28

88

E
53

BE

AD
D3

0
3E

E4
7

8F
6
70

C
E9

80

E3
A

A3
C9

0E
53
E3

E2

8
D3

CB

Q4. (20)
4
7

8F
06
70
B

E
E9

3
A

A3
9

28
3C

0E
3
E3

0C

48
D3

75

A. Explain the difference between passive and active attacks with examples
3E

8F
6
CB

8E
E9

0
37
A

C9

88

0E

B. Explain the relevance of the OSI 7 Layer Model to Computer Forensics?


E3

2
D3

75
A3

E4

06
70
CB

E9

93
A
8F

28

88
3
E3

0C
D3

75
A3
E

3E

E4
60

CB

7
A

Q5. (20)
8F

28
53
80

E3

0C
D3
A3
E

3E
97
60

CB

A. Discuss human based and computer based social engineering.


37
A
8F

3E

C9
0

E3

75
A3
88

AD

70

B. What is digital evidence? Discuss the challenges in handling Duplication and


60

CB

E9
E4

8F

53
0

E3

D3
A3
28

88

Preservation of Digital Evidence.


97
60

3A
E

E4

8F

3E
C
93

A3
28

88

BE

AD
60
E

E4

8F

Q6. (20)
93

E3
A3
28

88

E
0C

60

CB
E

E4

8F

A. What is Android Data Extraction? Explain Android Data Extraction Techniques.


93

80
37

A3
28

0E
0C

48
75

B. What is an intrusion detection system? Give its advantages and disadvantages.


E

8F
6
E
E9

93

80
7

28

0E
53

0C

48

*****************
3E
97

06
E
7
E

28

88
53

0C
D3

3E

E4
97

7
3A

33178
28
53

Page 1 of 1
0C
D3
E

3E
97
CB

7
3A

9
53

0C
D3
BE

97

7
3A

3CBE3AD3E975370C93E28E488060E8FA
3E
3C

53

You might also like