0% found this document useful (0 votes)
19 views4 pages

JFQ4A

question

Uploaded by

Santhosh Kumar P
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views4 pages

JFQ4A

question

Uploaded by

Santhosh Kumar P
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

B.E./B.Tech./M.E./M.B.A.

DEGREE END SEMESTER EXAMINATIONS, April-June


2021

JCS1010 – Cyber Security and Digital Forensics

Time : Three hours Maximum : 100 marks

Answer ALL questions

PART A – (10 × 2 = 20 marks)

1. Write down the set of queries raised by an investigator for determining the crime as a
computer crime.

2. Define the term Forensic Duplication.

3.What are the two types of applications based on which software forensic tools are
grouped? Give an example for each.

4. Write down the three rules for a forensic hash.

5. List down the four places where mobile device information might be stored.

6. What is steganography? State its purpose.

7. Define the skills required to become an ethical hacker.

8. State the differences between worms and viruses.

9. Name the attack that an attacker is trying to do by writing the SQL statement given below.
SELECT UserId, Name, Password FROM Users WHERE UserId = 100 or 1=1;

10. What is meant by session Hijacking?

PART B – (5 × 16 = 80 marks)

11. (a) Discuss in detail the subfunctions involved in the data acquisition process of
Forensic Investigation.
Or

(b) Explain in detail the steps for effective Incident Response conducted by an
Organization’s Incident Response Team to respond and recover from cyber attacks.

12.(a) There is a case about an illegal money transfer. The accused in this case is a person
who is worked in a BPO. He was handling the business of a multinational bank. So, he
had used some confidential information of the banks customers and transferred huge
sum of money from the accounts. As a forensic expert write a report detailing the steps
needs to be taken to gather the necessary evidence and the forensic analysis to be done
to resolve the case.

Or

(b) What are different methods of verifying the integrity of the digital evidence. Discuss
in detail.

13. (a) Explain how the packet analyzers are used to analyze the network data in order
to track the network traffic to ascertain an attack.

Or

(b) Describe the tasks in investigating e-mail crimes and violations.

14. (a) Describe the ways of conducting ethical hacking.

Or

(b) What are the two types of sniffing and explain how a sniffer works.
Also mention the countermeasure for sniffing.

15. (a) Explain in detail the two types of social engineering attacks.

Or

(b) Discuss in detail the vulnerabilities in the mobile.

_______________

2 <Question Paper Code>


COMPETENCY LEVEL DISTRIBUTION TABLE FOR QUESTIONS
(Please indicate the standard of questions as FL/ML/HL)

B.E./B.Tech./M.E./M.B.A. DEGREE END SEMESTER EXAMINATIONS, <MONTH


YEAR>

<Course Code> – <Course Title in Capital Letters>

PART A PART B

Q. No. Std. of Question Q. No. Std. of Question

1 11 (a)

2 11 (b)

3 12 (a)

4 12 (b)

5 13 (a)

6 13 (b)

7 14 (a)

8 14 (b)

9 15 (a)

3 <Question Paper Code>


10 15 (b)

4 <Question Paper Code>

You might also like