P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination O O
June, 2015
MSEI-027 : DIGITAL FORENSICS Maximum Marks : 50 Time : 2 hours Note : (i) Section 'A'- answer all the objective type questions. (ii) Section 'B'- answer all the very short answer type questions. (iii)Section 'C' - answer any two questions out of three short answer questions. (iv) Section 'D'- answer any two out of three long questions. SECTION - A (Attempt all the questions) 1.
Which Intrusion Detection System (IDS) usually provide the most false alarm due to unpredictable behaviors of users and networks ? (a) Network based IDS system (NIDS) (b) Host based IDS system (HIDS) (c) Anomaly Detection (d) Signature recognition
1
2.
refers to the unauthorized entry into a computer system.
1
MSEI-027
1
P.T.O.
3.
is the science of acquiring, preserving, retrieving and presenting data that has been processed electronically and stored on computer media.
1
4.
The first step in a digital Forensics process is
1
5.
GSM stands for
6.
Ubuntu is a(n)
1
7.
is the use of the internet or the other electronic means to stalk or harass an individual, a group of individual, or an organization.
1
8.
The name of website containing periodic posts
1
9.
When examining hard disk without 1 a write-blocker, you should not start windows because windows will write data to the : (a) Recycle Bin (b) Case files (c) BIOS (d) MSDOS. sys
10.
When performing a forensic analysis, what device is used to prevent the system from recording data on an evidence disk ? (a) Write-blocker (b) Protocal Analyzer (c) Firewall (d) Disk Editor
MSEI-027
1
2
1
SECTION - B (5 very short answer questions) (Attempt all questions) 11.
What is electronic tempering ?
2
12.
Define Active and Passive Reconnaissance in Hacking.
2
13.
Differentiate "copy of the drive"and "imaging of the drive".
2
14.
What is firewall ?
2
15.
What is cloud forensic ?
2
SECTION - C (Attempt 2 out of 3 short answer questions) 5
16.
What are some initial assessment you should make for a computing investigation ?
17.
Explain Daubert Guideline. Why these guidelines 5 helpful in the digital forensic investigation.
18.
What is IMEI ? Why it is used in mobile phone devices ? How it is helpful in forensic investigation ?
5
SECTION - D (Attempt 2 out of 3 long questions) 19.
Discuss the levels of analysis for data acquisition from mobiles phones.
MSEI-027
3
10
P.T.O.
20.
How digital evidence is processed ? What are the steps involved in Evidence Acquisition ? Explain with the help of hypothetical case.
21.
Write short notes on the following : (a) Hacking (b) Cloning in forensic analysis (c) Digital Evidence (d) Admissible Evidence (e) Logic Bomb
MSEI-027 No. of Printed Pages : 4 P.G. DIPLOMA IN INFORMATION ...
is the use of the internet or the other 1 electronic means to stalk or harass an individual, a group of individual, or an organization. 8. The name of website containing periodic 1 posts. 9. When examining hard disk without 1 a write-blocker, you should not start windows because windows will write data to the : (a) Recycle Bin.
r r -1:cr l r, 10 Tzt I 9z-1 9 . wrrrq -Etr-ffuff -vrff Tzt 4;1. I TITIFTft t mil)k-7-4T. )0I- -terT*74 Yid. IR I. (q) 111:1T7 p1T 2IT 13. T -g3TE rig t-u trTdT 2TT Feb 3Tcrq 3TK1 ...
P.G. DIPLOMA IN INFORMATION SECURITY .0. (PGDIS). N- r-. Term-End Examination. 0. C. June, 2015. MSEI-026 : BCP, DR PLANNING ... (b) Database with economic data. (c) Model base of quantitative analysis program. (d) All of the above. SECTION - B. (Att
software. /. 5. Software piracy is illegal. True or False ? 1. 6. Cryptography is the process of converting between readable text called and an unreadable form called. 1. 7. VPNs stands for. 1. 8. A refers to a skilled hacker who sometimes acts legal
ADMINISTRATION. (DNA). Term-End Examination ... (c) Explain the principles of supervision in ... (b) Explain the elements of evaluation with help of examples.
international trade of services, and state the suggestions made by trade and industry to the. Government for boosting services export. 12+8. 6. Discuss the recent economic developmental trends and foreign trade of Japan. 6+14. 7. (a) Explain briefly
process, enterprise, project or product. 3. Often there may be a BCM plan but it may not. 1 contain a ... In MS project a task that must be completed before 1 another task can start is called a. 8. For performing a Risk ... Explain the difference bet
MSEI-025 : APPLICATION AND BUSINESS. SECURITY DEVELOPMENTS. Time : 2 hours. Maximum Marks : 50. Note : Section (A) - Answer all the objective type ... What are " Application Maintenance Activities ". 5 and " Digest Access Authentication"? 18. Explain
(a) Common Management In Protocol. (b) Common Management Inter Protocol. (c) Common Management Internet Protocol. (d) None of these. 7. IDPS and IPS stands for and. 1. 8. SMB and SAM stands for and 1. 9. One of the well known webserver is SAMBA : 1.
SECTION - A. (Attempt all the questions). 1. Write True or False. 1x5=5. (a) Firewalls can greatly decrease the security of a host or a network. (b) Full form of PGP is Pretty Good Privacy. (c) Time stamp represents the time at which an event is reco
EDGE stnds for Enhanced Data GSM 1. Environment. (a) TRUE. (b) FALSE. 10. is the collection of infected computers 1 or bots that have been taken over by ...
0. DIPLOMA IN ELEMENTARY EDUCATION. (D.ELEd.) Term-End Examination. June, 2015. BES-017 : SCHOOL EDUCATION, LEADERSHIP. AND CHANGE. Time : 3 hours. Maximum Weightage : 70%. Note : (i) All four questions are compulsory. (ii) All questions carry equal
December, 2014. OSEI-042 : SECURING INTERNET ACCESS. Time : 2 hours. Maximum Marks : 50. Note : Section A : Answer all the objective type questions. Section B : Answer all the very short answer type questions. Section C ... wavelength radio transmiss
SMB and SAM stands for and 1. 9. One of the well known webserver is SAMBA : 1. (a) True. (b) False. 10. GUI stands for Graph User Interface. 1. (a) True. (b) False ... Explain the difference between 'LINUX' and. 5. "UNIX" operating system. 17. Explai
One of the well known Operating System is 1. "Microsoft Windows Defender". (a) TRUE. (b) FALSE. 10. GUI stands for "Graphical User Interface". 1. (a) TRUE ... Write a short note on "Network Firewall" and. 2. "Antivirus Software". SECTION - C. Short a
Section D - Answer any two out of three long questions. SECTION - A. Objective type questions. (Attempt all the questions) : 1. PDA stands for. 1. (a) Personal Digital Assistant. (b) Personal Digital Admin. (c) Personal Digital Admission. (d) None of
SECTION C. Attempt any two out of three short answer type questions. 2x5=10. 12. Provide the key security issues for SOAP web services. 5. 13. Write the advantages and disadvantages of e-mail. 5. 14. A scripting language allows control of one or more
P.G. DIPLOMA IN INFORMATION SECURITY. cV. (PGDIS). 00. Term-End Examination. O. June, 2014 ... Regular auditing and accounting of your system 1 is useful not only for detecting intruders but also as a form of. MSEI- ... by software development compan
transfer of information. (e) A computer used as trap set to detect or 1 deflect unauthorised use is known as. SECTION - B. (Attempt all the questions). 3. Write short notes on the following : (a) IP Datagram. (b) Functions of the Firewall. (c) Stegan
SECTION - A. (Attempt all the questions). 10x1=10. 1. In an HTML document where is the correct place to refer to an external style sheet ? (a) At the top of the document. (b) In the section. (c) In the section. (d) At the end of the document. 2. Wh