Test
Test
DURATION: 3 HOURS
TOTAL MARKS: 100
UNIVERSITY NAME: NATIONAL INSTITUTE OF CYBER SECURITY
Subject: CS8391 - Cyber Security
Exam Code: CS101
[CSE]
4. Explain why Android is considered more secure for data and communications.
6. Describe the role of a prosecutor in bridging the information gap between technology and the legal
system.
7. Why is it important to protect the time of highly trained personnel in digital forensics?
9. What is the role of the VMware Diskmount utility in virtual disk imaging?
10. Explain how a timeline report can be useful in a forensic examination of a system.
1. a) Compare and contrast the use of password managers with traditional methods of password
storage.
(or)
b) Explain the process of validating a digital signature with an example.
2. a) Explain the potential challenges of returning a product purchased from an international online
retailer.
(or)
b) What are the key factors to consider when determining if an online business is reputable?
3. a) Discuss the role of encryption in protecting data transmitted over WIFI networks.
(or)
b) Illustrate the process of eavesdropping on an unencrypted WiFi network with a simple diagram.
4. a) Discuss the technological advancements that have contributed to the widespread adoption of
WiFi.
(or)
b) What are the basic skills required for a law enforcement officer to effectively seize digital
evidence?
5. a) Discuss the importance of understanding the basics of IP addressing for law enforcement
investigators.
(or)
b) Discuss the basic structure of an IP address and its role in cyber investigations.
6. a) Explain the process of 'creating and distributing viruses over the internet' and its consequences.
(or)
b) Describe the process of installing an encryption application on a smartphone for secure
communication.
3. What are the potential consequences of not having a well-defined incident response plan?
4. What is the role of MD5 hash algorithm in verifying data integrity during imaging?
5. What are the implications of the Heisenberg uncertainty principle in memory acquisition?