You are here: Home > Competitive Exams
All posts from

NIELIT Question Paper : C Level Course Cyber Forensic & Law

Institute : National Institute of Electronics and Information Technology (nielit.gov.in)
Course : C Level Course
Subject Code/Name : CE1.3-R4/Cyber Forensic & Law
Document Type : Old Question Paper
Location : India
Website : nielit.gov.in

Download Model/Sample Question Paper :
January 2012 : https://www.pdfquestion.in/uploads/nielit.in/7103-jan12CE13-R4.pdf
JULY 2012 : https://www.pdfquestion.in/uploads/nielit.in/7103-jul12CE13-R4.pdf
January 2013 : https://www.pdfquestion.in/uploads/nielit.in/7103-jan13CE13-R4.pdf
JULY 2013 : https://www.pdfquestion.in/uploads/nielit.in/7103-jul13CE13-R4.pdf
January 2014 : https://www.pdfquestion.in/uploads/nielit.in/7103-jan14CE13-R4.pdf
July 2014 : https://www.pdfquestion.in/uploads/nielit.in/7103-jul14CE13-R4.pdf

NIELIT Cyber Forensic & Law Sample Paper

CE1.3-R4:
NOTE:
Time: 3 Hours
Total Marks: 100

July 2013

1. a) Define computer forensics. Explain at least two techniques for computer forensic investigation

Related : NIELIT Question Paper C Level Course Project Management : www.pdfquestion.in/7101.html

b) What is software piracy? What methods should an organization implement to prevent software piracy?
c) What can be inferred from the word “Digital Forensics”?
d) How are deleted files from a computer hard disk be recovered?

e) Explain the difference between copying and imaging of a hard disk.
f) Explain the use of recycle bin and restoring from recycle bin.
g) What is volatile data? How it is useful in computer forensic investigation? Explain the method and tools for capturing volatile data. (7×4)

2. a) What is file carving? Explain Block-Based Carving and Statistical Carving in brief
b) Define the following terms:
i) Data diddling
ii) Email bombing
iii) Denial of Service attack
iv) Logic bombs

c) Define data acquisition. Explain methodology of data acquisition in detail. (6+4+8)

3. a) Explain the working of BIOS. How can BIOS be updated?
b) What is Personal Digital Assistant? Briefly mention the applications of Personal Digital Assistant
c) Explain the strategies to collect live network traffic data alongwith the criterion for their selection. (7+4+7)

4. a) What is Session Hijacking? Explain the methods for session hijacking
b) What is spoofing? Explain Caller ID spoofing, Email Spoofing, Web Spoofing in brief. (9+9)

5. a) Explain the technology advancements in Law Enforcement for Computer Forensics.
b) What are the features of NTFS v 3.0 file systems?
c) Write a short note on steganography. (6+8+4)

6. a) What is a swap file? Explain working of swap file with the help of a suitable example. What is the importance of a swap file in computer forensics?
b) Define CyberCrime. Distinguish between Computer Crime and Computer-related Crime.
c) Define Computer Forensic Toolkit. What standard features should be built in a toolkit? How are these useful in computer forensic analysis of digital evidence? (6+6+6)

7. a) What is Cloaking? Differentiate between Cloaking and IP delivery.
b) Define privacy law. Classify types of privacy law. Explain information privacy law.
c) Explain Public key cryptography with advantages and disadvantages (7+6+5)

July 2012

CE1.3-R4: Cyber Forensic And Law   :
1. a) List and explain the various kinds of cyber crimes.
b) What do you know about cyber forensics? How is it different from traditional forensics?
c) What is the role of ‘hash function’ in cyber forensics? Explain your answer with an example.

d) List the differences between deleted file recovery techniques and deleted partition recovery techniques.
e) What is file carving? List the software tools for file carving. Explain the process of file carving with the help of an example.
f) List at least four laws covered in IT act 2000. g) Define NIST in detail. (7×4)

2. a) List the hardware and software to be required for configuring your computer or laptop as a cyber forensic workstation. Explain the functioning of hardware’s and software’s used for this purpose.
b) What precautions should be taken while solving any case of cyber crime and why? Explain your opinion. (9+9)

3. Discuss the functioning of the following software’s used in cyber forensics.
a) FTK
b) Helix
c) Mandeant
d) Netwitness
e) Getfree
f) Safeback (6×3)

4. a) Discuss the differences between Public Key cryptography and Private Key cryptography. Explain your answer with an example.
b) Discuss the steps of Data hiding and seeking for i) NTFS and ii) ext (9+9)

5. List the command syntax/method for performing the following actions:
a) Collecting network traffic data and IP address and machine address of a machine.
b) Collecting the information of sender, who has sent a SPAM mail to you?
c) Collecting the keystrokes information of any computer machine.
d) Collecting the information about the external storage devices attached in past with your system. (4.5×4)

Leave a Reply

How to add comment : 1) Type your comment below. 2) Type your name. 3) Post comment.

www.pdfquestion.in © 2021

Contact Us   Privacy Policy   SiteMap