0% found this document useful (0 votes)
32 views1 page

UT-2 Question Bank

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views1 page

UT-2 Question Bank

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

STES’ SINHGAD COLLEGE OF ENGINEERING

DEPARTMENT OF COMPUTER ENGINEERING


UNIT TEST –II QUESTION BANK(2024-25)

UNIT-03: INTRODUCTION DIGITAL FORENSICS

Q.1 What is computer forensics? What is the use of Computer Forensics in Law Enforcement?
What are different computer forensics schemes?
Q.2 What is Computer forensics? What are different Computer forensics Schemes?
Q.3 How to prevent Computer Forensics Assistance to Human Resources/ Employment
Proceedings?
Q.4 Discuss the following (Solve any two)
i) Types of Military-Computer Forensic Technology
ii) Types of Law Enforcement
iii) Types of Business Computer Forensic Technology
Q.5 Explain in details Computer Forensics Assistance to Human Resources
Q.6 Explain the data recovery Solutions?
Q.7 What are the various business oriented digital forensic techniques?
Q.8 Illustrate how to prevent Computer Forensics Services?
Q.9 How does computer forensics help in law enforcement?
Q.10 Explain in brief computer forensic services. Write the applications of digital forensics
in military.

UNIT-04: EVIDENCE COLLECTION & DATA SEIZURE

Q.1 What are different computer evidence processing steps? Explain in Details
Q.2 Define the term of Evidence? What are types of evidence?
Q.3 Describe in brief the role of Computer Image Verification &Authentication
Q.4 What is the general procedure for evidence collection?
Q.5 What are various methods of collecting digital evidence? Enlist the various digital collection steps
Q.6 Explain the rule of evidence?
Q.7 What are the typical steps followed by computer forensics specialists in an investigation? Explain any
2 in detail.
Q.8 Discuss the various legal aspects of collecting and storing digital evidence?
Q.9 Write a short note on
i) Preserving the Digital Crime Scene
ii)Computer Evidence Processing Steps
Q.10 What is Chain of custody? Explain the process chain of custody
Q.11 List and explain Computer Evidence Processing Steps
Q.12 Discuss the methods of collection? Explain steps of Collection?

You might also like