JFQ4A
JFQ4A
1. Write down the set of queries raised by an investigator for determining the crime as a
computer crime.
3.What are the two types of applications based on which software forensic tools are
grouped? Give an example for each.
5. List down the four places where mobile device information might be stored.
9. Name the attack that an attacker is trying to do by writing the SQL statement given below.
SELECT UserId, Name, Password FROM Users WHERE UserId = 100 or 1=1;
PART B – (5 × 16 = 80 marks)
11. (a) Discuss in detail the subfunctions involved in the data acquisition process of
Forensic Investigation.
Or
(b) Explain in detail the steps for effective Incident Response conducted by an
Organization’s Incident Response Team to respond and recover from cyber attacks.
12.(a) There is a case about an illegal money transfer. The accused in this case is a person
who is worked in a BPO. He was handling the business of a multinational bank. So, he
had used some confidential information of the banks customers and transferred huge
sum of money from the accounts. As a forensic expert write a report detailing the steps
needs to be taken to gather the necessary evidence and the forensic analysis to be done
to resolve the case.
Or
(b) What are different methods of verifying the integrity of the digital evidence. Discuss
in detail.
13. (a) Explain how the packet analyzers are used to analyze the network data in order
to track the network traffic to ascertain an attack.
Or
Or
(b) What are the two types of sniffing and explain how a sniffer works.
Also mention the countermeasure for sniffing.
15. (a) Explain in detail the two types of social engineering attacks.
Or
_______________
PART A PART B
1 11 (a)
2 11 (b)
3 12 (a)
4 12 (b)
5 13 (a)
6 13 (b)
7 14 (a)
8 14 (b)
9 15 (a)