P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination O O
June, 2015
MSEI-027 : DIGITAL FORENSICS Maximum Marks : 50 Time : 2 hours Note : (i) Section 'A'- answer all the objective type questions. (ii) Section 'B'- answer all the very short answer type questions. (iii)Section 'C' - answer any two questions out of three short answer questions. (iv) Section 'D'- answer any two out of three long questions. SECTION - A (Attempt all the questions) 1.
Which Intrusion Detection System (IDS) usually provide the most false alarm due to unpredictable behaviors of users and networks ? (a) Network based IDS system (NIDS) (b) Host based IDS system (HIDS) (c) Anomaly Detection (d) Signature recognition
1
2.
refers to the unauthorized entry into a computer system.
1
MSEI-027
1
P.T.O.
3.
is the science of acquiring, preserving, retrieving and presenting data that has been processed electronically and stored on computer media.
1
4.
The first step in a digital Forensics process is
1
5.
GSM stands for
6.
Ubuntu is a(n)
1
7.
is the use of the internet or the other electronic means to stalk or harass an individual, a group of individual, or an organization.
1
8.
The name of website containing periodic posts
1
9.
When examining hard disk without 1 a write-blocker, you should not start windows because windows will write data to the : (a) Recycle Bin (b) Case files (c) BIOS (d) MSDOS. sys
10.
When performing a forensic analysis, what device is used to prevent the system from recording data on an evidence disk ? (a) Write-blocker (b) Protocal Analyzer (c) Firewall (d) Disk Editor
MSEI-027
1
2
1
SECTION - B (5 very short answer questions) (Attempt all questions) 11.
What is electronic tempering ?
2
12.
Define Active and Passive Reconnaissance in Hacking.
2
13.
Differentiate "copy of the drive"and "imaging of the drive".
2
14.
What is firewall ?
2
15.
What is cloud forensic ?
2
SECTION - C (Attempt 2 out of 3 short answer questions) 5
16.
What are some initial assessment you should make for a computing investigation ?
17.
Explain Daubert Guideline. Why these guidelines 5 helpful in the digital forensic investigation.
18.
What is IMEI ? Why it is used in mobile phone devices ? How it is helpful in forensic investigation ?
5
SECTION - D (Attempt 2 out of 3 long questions) 19.
Discuss the levels of analysis for data acquisition from mobiles phones.
MSEI-027
3
10
P.T.O.
20.
How digital evidence is processed ? What are the steps involved in Evidence Acquisition ? Explain with the help of hypothetical case.
21.
Write short notes on the following : (a) Hacking (b) Cloning in forensic analysis (c) Digital Evidence (d) Admissible Evidence (e) Logic Bomb
(PGDIS) Term-End Examination O June, 2015 O MSEI-027
provide the most false alarm due to unpredictable behaviors of users and networks ? (a) Network based IDS system (NIDS). (b) Host based IDS system (HIDS).
Explain the Rabin signature scheme in 5 cryptography. 5. Explain a cryptographic protocol and entity 5 authentication protocol. 6. How does due diligence ensure Compliance of IT 5. Act ? 7. Explain the function of Cyber Appellate Tribunal. 5. SECTION
Define various encryption. 5 terms used. SECTION - D. (Attempt 2 out of 3 long type questions.) 7. With the help of neat diagram, briefly explain the 10 types of fire walls. 8. Explain Network Layer Attack. Discuss packnet 10 sniffing in detail. 9. D
(d) Collisions are a well-known weakness in cryptography in which plain text messages can generate identical cipher - text messages using different keys and ...
Answer all the ten questions. 10x2=20. 1. How does Hobbes define Property ? 2. Define Intellectual Property Rights. 3. What do you mean by the term rights ? 4. Define right in personam. 5. Define rights in rcm. 6. What are the rights of the patentee
2017-2018 All State Junior Chorus Audition Selections. O. Mu sic, sweet mu sic, thy prai ses we will sing. we will mf. -. -. -. 5 tell of the plea sures and hap pi ness ...
(c) Time stamp represents the time at which an event is recorded by a computer, not the ... tag or label into a multimedia object. (e) can be defined as the practice.
S. T. A. T. E. R. D. HU. SK. EY R. D. M. O. S. IE. R. C. R. M. ILL C. RE. EK. RD. G. O. D. B. E. R. S. O. N. R. D. PLEASANT RIDGE RD. PINE HOLLOW RD. FIVEM.
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. O VELHO E O ...
Page 1 of 26 ... 397 old chelsea station. New york, NY 10113. http://www.usgo.org. Page 2 of 26 ... o-caminho-para-o-go.pdf. o-caminho-para-o-go.pdf. Open.
opta pela 2a opção. Page 3 of 14. O Velho e o Mar.pdf. O Velho e o Mar.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying O Velho e o Mar.pdf.
... questions out of three short answer type questions. Section D â Answer any two questions out of three long answer type questions. SECTION A. Attempt all the following questions. 10x1=10. 1. is one where the suspect operating system is still run
connor pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. clinical examination talley and o connor pdf. clinical examination ...
Hiſ car T-IT CITI facili Hardy,. Rigi di. : dair faced Hialed I, ... del 3d 34 foll & Hrdly do I uſ todd | 3 ||colſ de I did go cit frt Udet cliſt faſt. fitſ Hot Riddle-Hat diap Hg a ...
Hiſ car T-IT CITI facili Hardy,. Rigi di. : dair faced Hialed I, flag at. 2T it it at H-II Halda, Rica at. 2T it diff, uliar TIT Trface 3 g g at Hardy, frigadi. 2fT a .22, Hral city, ...