You are here: Home > Computer Science CSE
All posts from

09A50504 Computer Forensics B.Tech Question Paper : sphoorthyengg.com

Name of the College : Sphoorthy Engineering College
University : JNTUH
Department : COMPUTER SCIENCE AND ENGINEERING
Subject Code/Name : 09A50504/COMPUTER FORENSICS
Degree : B.Tech
Year/Sem : III/I
Website : sphoorthyengg.com
Document Type : Model Question Paper

Download Model/Sample Question Paper : https://www.pdfquestion.in/uploads/sphoorthyengg.com/4838-09A50504%20-%20COMPUTER%20FORENSICS.pdf

Sphoorthy Computer Forensics Question Paper

B. Tech III Year I Semester Examinations, December-2011
(COMPUTER SCIENCE AND ENGINEERING)
Time: 3 hours

Related : Sphoorthy Engineering College 09A50501 Principles of Programming Languages B.Tech Question Paper : www.pdfquestion.in/4843.html

Max. Marks: 75
Answer any five questions :

SET I

All questions carry equal marks :
1.a) What is computer forensics? Explain the use of computer forensics in law enforcement?
b) Explain the following business computer forensics technology
i) creating trackable electronic documents
ii) Forensic services available. [7+8]

2.a) Discuss a solution for data recovery?

b) Explain controlling contamination: The chain of custody? [7+8]
3. What are the steps involved in computer evidence processing? Explain. [15]

4.a) Explain the process of validating the forensic data?
b) What is live acquisition? How are they performed? [7+8]
5. How are evidences collected in private-sector incident scenes? Explain. [15]

6.a) How do you evaluate computer forensic tools?
b) Explain computer forensics hardware tools? [7+8]
7.a) Explain the forensics tools used for e-mail investigation?
b) Discuss about mobile forensics tools? [7+8]

8. Write short notes on:
a) FAT disks
b) Windows Registry. [15]

SET II

R09Code No: 09A50504
1. Explain the computer forensics services? [15]
2.a) Explain the factors that affect backup in data recovery?
b) Discuss the methods of collection of evidences? [7+8]

3.a) What is duplication of digital evidence? Explain its purpose?
b) Explain the special needs of evidential authentication? [7+8]
4.a) Briefly explain the process of determining of what data to collect and analyze in computer forensics?
b) How are standard procedures developed for network forensics? [7+8]

5. Explain the process of seizing of digital evidence at the scene? [15]
6.a) What are types of computer forensics tools?
b) Explain any two computer forensics software tools? [7+8]
7. Explain the process of investigating E-mail crimes and violations? [15]

8. Write short notes on:
a) Windows Registry
b) NTFS System Files. [15]

SET III

R09Code No: 09A50504
1.a) What are the benefits of professional forensics methodology? Explain.
b) Explain how law enforcement is done in computer forensics? [7+8]
2.a) Explain how data backup and recovery is done in computer forensics?
b) Explain the rules of collecting electronic evidence? [7+8]

3. How Authenticode works with VeriSign Digital IDs? [15]
4.a) How remote acquisition is performed in computer forensics?
b) Give an overview of network forensics? [7+8]

5.a) How do you secure a computer incident or crime scene?
b) Explain evidence retention and media storage needs? [7+8]
6. Briefly explain the tasks performed by computer forensics tools? [15]

7.a) What is role of e-mail in forensic investigations?
b) Explain the SIM card and SIM file structure? [7+8]
8. Write short notes on:
a) MS-DOS startup tasks
b) Virtual machines. [15]

SET IV

B. Tech III Year I Semester Examinations, December-2011 Set 4 :
Computer Forensics : (Computer Science And Engineering)
Time : 3 hours
Max. Marks : 75
Answer any five questions. All questions carry equal marks
1.a) Explain the steps taken by computer forensics specialists?
b) Explain the following business computer forensics technology
i) Remote monitoring of target computers
ii) Theft recovery software for laptops and PCs. [7+8]

2.a) Explain the obstacles you find in backing up applications?
b) Explain the types of Evidences? [7+8]
3. Explain the legal aspects of collecting and preserving computer forensic evidence? [15]

4.a) Explain the process of validating the forensic data?
b) Give an overview of Network forensics? [7+8]
5. Briefly explain processing of law enforcement crime scenes? [15]

6.a) What are the functions of forensic tools?
b) Give a note on forensic workstations? [7+8]
7.a) What are the roles of the client and server in e-mail investigation?
b) Explain the acquisition procedure for cell phones and mobile devices? [7+8]

8. Write short notes on :
a) Windows XP startup tasks
b) Virtual machines.

Leave a Reply

How to add comment : 1) Type your comment below. 2) Type your name. 3) Post comment.

www.pdfquestion.in © 2021

Contact Us   Privacy Policy   SiteMap