P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) ce Term-End Examination June, 2016 MSEI-027 : DIGITAL FORENSICS Time : 2 hours Note : (i) (ii) (iii) (iv)
Maximum Marks : 50 Section A - Answer all the objective type questions. Section B - Answer all the very short answer type questions. Section C - Answer any two out of three short answer type questions. Section D - Answer any two out of three long answer type questions.
SECTION
-
A
(Attempt all the questions.) 1.
FTC stands for
1
(a)
Federal Trade Commission
(b)
Federal Trade Commissioner
(c)
Federal Trade Command
(d)
None of these
2.
RSA is
3.
DDOS stands for
MSEI-027
key cryptosystem.
1 1
1
P.T.O.
4.
A attacker entices computer to log into a computer, which is set up as an AP (Access Point).
1
5.
is a collection of infected computers or bots that have been taken over by hackers and are used to perform malicious tasks or functions.
1
6.
is a digital object that contains reliable information that supports or refutes a hypothesis.
1
7.
is a computer program that can copy itself and infect a computer.
1
8.
An is a form of internet text messaging or synchronous conferencing.
1
9.
WAP stands for Wired Application Protocol :
1
10.
(a)
True
(b)
False
"PGP" stands for
MSEI-027
1 2
SECTION - B Very short type of questions. (Attempt all the questions.) 11.
What is Spoofing ?
12.
What is 'Identity theft' ? Define types of data theft.
2
13.
What is exculpatory evidence ?
2
14.
Differentiate "copy of the drive" and "imaging of the drive".
2
15.
What are three major phases of Digital Forensics ?
2
SECTION - C {Attempt 2 out of 3 short type questions.) 16.
What is Money laundering ?
5
17.
Explain the advantages and disadvantages of software based firewall and hardware based firewall.
5
18.
What are some initial assessment you should make for a computing investigation ?
5
MSEI-027
3
P.T.O.
SECTION - D (Attempt 2 out of 3 long questions.) 19.
Explain "Log File Analysis". What is "File 10 Carving" in Data recovery ? What is salvaging of data ?
20.
What is Intrusion Detection System ? How does 10 it different from firewall ? Define IPS.
P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) ce Term-End ...
(Attempt 2 out of 3 long questions.) 19. Explain "Log File Analysis". What is "File 10. Carving" in Data recovery ? What is salvaging of data ? 20. What is Intrusion Detection System ? How does 10 it different from firewall ? Define IPS. 21. Write a short note on the following : 10. (a). Cyber bullying. (b) SIM Card Acquisition. (c).
(a) CASCO. (b) Cyber - terrorism. (c) TRIPS Agreement. (d) Cyber defamation. (e) Liability of internet service provider. 2. What is the role of certifying authority ?
Which of the following is the benefit of the. 1 three-tier architecture ? (a). New modules can be built to support specific business needs. (b). Performance improves for compiled SQL statements. (c). Results in a thinner client and database server. (
5. Why we need hybrid IDSs ? 5. Give the difference between Symmetric and. 5. Asymmetric Cryptography. 6. Explain the types of digital watermarks. 5. SECTION - D. (Attempt 2 out of 3 long type questions). 7. Explain the application of Biometrics tech
is a category of computer crime that. 1 employs ... computer system. 2. ... decimal. 8. The full form of RSS in RSS feed is. 9. In certain tuples/records satisfying. 1.
Section A - Answer all the questions. Section B - Answer all the questions. Section C - Answer any three questions out of four. SECTION A. Answer all the questions. 1. Write short notes on the following : 15. (a) User Account Policy. (b) ISO 27001. (
11. What do you mean by reverse engineering ? 12. List some of major e- mail related crimes. 13. What is the use of minus (-) operator in Search engine ? 14.
Note : Section 'A'-Answer all the questions. Section 'B'-Answer all the questions. Section 'C'-Answer any three questions out of four. SECTION - A. Answer all the questions. 1. Write short notes (any four). 12. (a) CASCO. (b) Cyber - terrorism. (c) T
Time : 2 hours. Maximum Marks : 50. Note : (i) Section - A : objective type questions. (ii) Section - B : very short answer ty pe questions. (iii) Section - C : short answer hoe questions. (iv) Section - D : long answer type questions. SECTION - A. (
P.G. DIPLOMA IN INFORMATION SECURITY. (PGDIS). CN1. Term-End ... What is cloud forensic ? 2. MSEI-027. 3 ... Explain the principles of Computer - Based. Evidence. 17. ... Explain the classification of CFCC (Cyber Frand 10 and Cyber ...
1. 3. A Recovery Time Objective (RTO) is the period of. 1 time within which systems, processes, services or functions must be recovered after an outage. (a) True.
PG Diploma in Translation & PG Diploma in Vachana St ... -15 onwards syllabus is continued to 2016-17 A.Y.pdf. PG Diploma in Translation & PG Diploma in ...
Spell out in detail the provisions of the Banking Regulation Act, 1949 pertaining to. the conditions under which the R.B.I. may extend license to a Banking ...
PG Diploma in Ambedkar Studeis 2014-15 onwards syllabus is continued to 2016-17 A.Y.PDF. PG Diploma in Ambedkar Studeis 2014-15 onwards syllabus is ...
Page 1 of 32. 1. INDIAN INSTITUTE OF MATERIALS MANAGEMENT. Post Graduate Diploma in Materials Management. Graduate Diploma in Materials Management. PAPER 12. Packaging & Distribution Management. Date: 14.06.2010 Max Marks: 100. Time: 10.00 AM to 1.00