You are on page 1of 6
Unitwise Frequently Asked Questions and Important Questions Qi. Define cyber crime. Explain the categories of it, Answer = Important Question For answer refer Unitel, Q9. a2. Explain briefly about, (a) The internet spawns crime (b)_ Worms versus viruses. Answer = Important Question For answer refer Units. QU Q3. Discus about ident response methodology. Answer : Important Question For answer refer Unit-l, QUS, Q4. Explain how to develop response strategy. Answer = Important Question For answer refer Unit-, Q17. Q5. Discuss briefly about, (a) Reporting (b) Resolution. Answer : Important Question For answer refer Unit-1, Q19. Q6. Explain the phases after detection of an Incident. Answer : Important Question Q1. Explain the process of storing information obtained during the initial response in Windows systems. Also discuss the following, (i) Transferring data with netcat (ii) Encrypting data with cryptcat. For answer refer Unit-l, Q21 Answer : Important Question For answer refer Unit-Il, Q10. Q2, Describe the procedure of performing an in-depth live response. Answer : Important Question For answer refer Unitll, Q12. Q3. Explain the process of storing information obtained during the initial response in Unix systems. bins wed/it Important Question, For answer refer Unit-II, Q15 SPECTRUM ALL-IN-ONE JOURNAL FOR ENGINEERING STUDENTS SIA GROUP YS M U { Scanned with CamScanner Q4, Dofino tho following, () Forensic duplicate (i) Qualified foronste duplicate (lil) Restored Imago (iv) Mirror Image, Answer ‘ioportin For answer refer Unitell, Q1S, Q5. Explain the process of creating a forensic duplicate of a hard drive. Answer t npg For answer refer Unit-Il, Q20, Q6. Discuss in detail tho process of creating a qualified forensic duplicate using Encase. Answer : : ocr Q1. Explain a standard procedure often used in network forensics. For answer refer Un Q23, Answer : For answer refer Unit-IIT, Q22. : 5 Q2. Write short notes on network forensic overview. Answer For answer refer Unit-ll, Q19. Q3. How do you validate the forensic data? Explain. Answer : Fla For answer refer Unit-Ill, QUS. als Q4.. Explain the data hiding techniques. . i . ry Answer BL 2 ie For answer refer Unit-Ill, Q16. Q5. Briefly explain the process of determining of what data to collect and analyze. Answer : aE For answer refer Unit-IlJ, Q10., 6. Explain how to examine the encrypted files and recover the passwords. : : = baiemeds 4 {Important Question | Aprivay-12, Set, 04 For answer refer Unit-ll, QU7. Q7. What is Live Acquisitions? How live acquisition'Is performed in windows environment? i ‘Answer: {Important Question | Apritaay-t2, Set HP For answer refér Unit-IIl, Q21. : : Look for the SIA GROUP Loco nthe TITLE COVER before‘you buy Scanned with CamScanner fags and IQs TNE ARIMA a8. Explain the usage of UNIX/LINUX network forensics tools, Answer syver refer Unit AM, 25, Write in detail about Honeynet project: wen: Por answer reter Uni Anton Cation Important Cation Awswer For answer refer Unit-1V, ( Q3. Explain the tasks performed by computer forensics tools, Answer For answer refer Unit-1V, QUG, For answer refer Unit-1V, Q23. Q8. In detail discuss the features and types of computer forensics software tools. Q4.. Explain the different types of computer forensic tools. amc 4 a For answer refer Unit-IV, QO. Q5.:° Explain the acquisition procedure for mobile devices. fi] 3 For answer refer Unit-IV, Q42. £ Q6. Explain mobile device forensics. i 3 For answer refer Unit-LV, Q38. Q7. Discuss the role of e-mail in computer forensic investigations. " ia] 3 ame : [3 | For answer refer Unit-lV, Q25 For answer refer Unit-IV, QL. Q9. Explain the mobile forensic tools. i Fl 2 For answer refer Unit-lV, Q43. Q10. Explain the process of investigating e-mail crimes and violations. Fi ra SPECTROM ALLIN-OME JOURNAL FOR ENGINEERING STUDENTS. Sia GROUP {S Scanned with CamScanner COMPUTER FORNESICS eee Q11, Explain about specialized e-mail forensic tools. Pay Answer: 2 [Timea] o For answer refer Unit-lV, Q35, Q12. Briefly oxpiain tho roles of the client and sorver In o-mall. — Answer 2 fres} For answer refer Unit-IV, Q24. Q13. Explain the computer forensics hardware tools. FF 2 Answer t Fees} For answer refer Unit-IV, Q20, Q14. How do you evaluate computer forensic tools? Answer t (important Question | Dac, Sat, ay For answer refer Unit-IV, Q9. Q15, Discuss the sub functions of validation and discrimination. | Answer : Important Quest For answer refer Unit-lV, Q12. Q16. Whatis extraction function in computer investigation? Explain the sub functions of extraction that. used in investigations. Answer : . (Important Question | AprivMay-12, Set-, a For answer refer Unit-lV, Q13. Q17. Discuss about the command line forensics tool ; Answer : Important For answer refer Unit-IV, QU7. Q18. Whiat criteria are used for testing computer forensic tools? List the programs used for testing. Answer: | Important Questa For answer refer Unit-IV, Q21. ; 19. Write the steps to retrieve or view the e-mail headers in following e-mail programe, (a). Outlook (b) Outlook express (c) Novell Evolution _ (d)_ UNIX Pine. Answer : ~ tiiporand oe For answer refer Unit-IV, Q26. Q20. How e-mail messages can be accessed by using hexadecimal editor? Answer : : ; important ose For atiswer refer Unit-LV, Q37. 21. Explain how microsoft e-mail server performs logging, Answer: For answer refer Unit-IV, Q33, poses Look for the SIA GROUP Loco Zon the TITLE COVER before you buy | Scanned with CamScanner FAQs and 1s (A ——reiebomnagigrmenid at, Discuss about, (a) Virtual machines _ (b) MS-DOS startup tant |4 | Anewer | We For anewor refer Unit. QN2 G2 Expinin the following, (a) NTFS system files — (>) Windows registry, f[2 Answer! For answer refer Unit-V, Q23 G3. Write short notes on NTFS disks. Answer For answer refer Unit-V, QU. Q4, Explain the Microsoft file structures, fz Answer: For answer refer Unit-V, Q13. Q5. Explain the components of a disk drive, Answer : For answer refer Unit-V, QU. 6. What is a master boot record? How can FAT dl (8 bo oxaminod? a Important Question For answer refer Unit-V, QIS. Q7. Describe in brief about MFT, Explain In detail about filo attributes of MeT. Answer 1 Important Question For answer refer Unit-V, Q19. Q8. Explain about the following, () NTFS data streams (i) NTFS compressed files (Wl) NTFS Encrypting File Systom (EFS) (iv) EFS recovery key agent (W)_ Deleting NTFS files. Answer Important Question For answer refer Unit-V, Q20. SPECTRUM ALLIN-ONE JOURNAL FOR ENGINEERING STUt Sia GROUPS, Scanned with CamScanner FG COMPUTER FORNESICS [JNTU-HYDERABAD) Q9. Explain the whole disk encryption. Answer : . , Ainportant Qvostion|Anritay-42, 502,28 For answer refer Unit-V, Q21 Q10. What are the startup fiels of windows XP? Explain. Answer : (important Question | Nov.Dee.471R19), O19), For answer'refer Unit-V, Q27. Q11. Write short notes on, (2) Windows XP startup tasks (b) Virtual machine: {Important Question | Dec.-t1, Set, a2), Answer : For answer refer Unit-V, Q33. Q12. Discuss about the activity performed using an ISO image for getting the valid license from-instructor. Answer : Important Question “For answer refer Unit-V, Q35. Scanned with CamScanner

You might also like