DF&CCI Set 2
DF&CCI Set 2
DEPARTMENT OF CSE
UNIVERSITY EXAMINATION
5. Which of the following techniques are used during computer forensics investigations?
A. Cross-drive analysis
B. Live analysis
C. Deleted files
D. All of the above
6. Deleted files is a common technique used in computer forensics is the recovery of deleted files.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
7. law of evidence consists of
A. ordinary rules of reasoning
B. legal rules of evidence
C. rules of logic
D. all the above
8. Facts which are necessary to explain or introduce relevant facts of place, name, date, relationship &
identity of parties are relevant
A. under section 8 of Evidence Act
B. under section 9 of Evidence Act
C. under section 10 of Evidence Act
D. under section 11 of Evidence Act
9. In the context of cybercrime investigations, what does "phishing" refer to?
A. The unauthorized access of computer systems.
B. The manipulation of search engine results.
C. The act of tricking individuals into revealing sensitive information.
D. The use of malware to disrupt computer networks.
10. Which of the following is an example of a cybercrime involving unauthorized access to computer
systems?
A. Identity theft.
B. Denial-of-service (DoS) attacks.
C. Phishing scams.
D. SQL injection attacks.
13. What are computer components used in Digital Forensics. Explain few of them.
14. Describe the concept of memory organization in a computer system. Explain the different types of
memory, such as RAM and ROM , and their respective roles in storing and accessing data.
15. What are the different types of tools used in digital forensics?
16. What do computer forensic investigators do? What are their task and responsibilities?
17. What are some techniques and standards for the preservation of data in digital forensic
investigations?
or
21. Explain the input and output devices used in digital forensics.
or
22. Explain Operating System Architecture in detail with diagrams.
or
25. Discuss OS and file system forensics, including techniques/tools for analyzing them for digital
evidence. Explain challenges and potential findings in this field.
or
26. Facts need not be proved under the Evidence Act 1872.
27. Explain common types of computer, network, and system attacks in digital forensics. Discuss their
characteristics, motivations, and potential impacts.
or
28. Discuss case studies related to web forensics. Analyze real-world scenarios involving web-based
attacks, digital evidence extraction from web servers, analysis of web application logs, or online
fraud investigations. Explain the investigative techniques employed and the outcomes of each case.
Answer Key
1 A 1
2 D 1
3 B 1
4 D 1
5 D 1
6 A 1
7 B 1
8 B 1
9 C 1
10 A 1
Computer Files
Emails
Internet History
Call Logs
Metadata
System Logs
Child pornography -
1. Forensic Workstations:
2. Write-Blockers:
3. Imaging Tools:
4. Hashing Tools:
1. EnCase:
3. Autopsy:
4. X-Ways Forensics:
5. Volatility:
6. Cellebrite UFED:
7. Wireshark:
9. Magnet AXIOM:
1. Forensic Imaging:
2. Write Protection:
3. Chain of Custody:
4. Hashing:
5. Data Verification:
7. Adherence to Standards:
Reverse Steganography
0Stochastic Forensics
Cross-drive Analysis
Live Analysis
2. Chain of Custody:
4. Rules of Evidence:
5. Expert Testimony:
8. Cross-Border Investigations:
Input Devices:
1. Keyboards:
3. Touchscreens:
Output Devices:
2. Printers:
4. Forensic Write-Blockers:
5. Projectors:
22 Operating System 12
Kernel:
Shell:
Monolithic Architecture
Layered Architecture
Microkernel Architecture
Hybrid Architecture
1. First Response
3. Evidence Collection
5. Data Acquisition
6. Data Analysis
7. Evidence Assessment
1. Legal Authority:
2. Volatility:
3. Documentation:
5. Verification:
6. Chain of Custody:
7. Validation:
9. Privacy Considerations:
1. Disk Imaging:
2. File Recovery:
5. Registry Analysis
8. Malware Analysis:
1. Encryption:
2. Anti-Forensic Techniques:
3. Fragmentation:
4. Data Hiding:
5. User Artifacts:
6. Timestamp Analysis:
1. Malware Attacks:
2. Network Attacks:
5. Insider Attacks: