You are on page 1of 2

Amrutvahini College of Engineering, Sangamner

Department of Computer Engineering


Exam-:MOCK-ENDSEM Subject: - CSDF Code: 410244
Semester: I Year: 2023-24 Marks:70
Class: B.E (Comp) Pattern: -2019 Time: 21/2 Hours

Note: Solve Q1 or Q2 , Solve Q3 or Q4, Solve Q5 or Q6, Solve Q7 or Q8.

Q. Mar PS BT
Questions CO PO
N k O Level
What is digital forensics? State and explain
A general tasks that the investigations perform 5 3 1,6 1 1,2
when working with digital evidence.
1 Enlist roles & features of Sleuth kit tool and
B 6 3 1,5 3 2
FTK tool.
C Discuss computer forensics services in detail. 6 3 1,12 1 1
OR
What is the use of computer forensics in law
A 5 3 1,6,8 1,3 1,2
enforcement?
How can hidden data in forensic Technology be
B 6 3 2,9 1 3
2 found?
List & explain steps taken by computer
C 6 3 2,6 2,3 2
forensics specialists.
A Why collect evidence? Explain evidence
collection options & evidence collection 6 4 1,6 1 4
obstacles.
3 B List any 5 rules of evidence. What are the
6 4 1,2 1 1,2
challenges in evidence handling?
C Analyze how following techniques are used.
i)Documents evidence in the Lab. 6 4 2,3 1,2 2,4
ii)Processing & handling Digital evidence.
OR
A Enumerate the guidelines for seizing digital
6 4 1 1 4
evidence at the scene.
B Why should the computer incident or crime
1,6,1
4 scene be secured? Who is responsible for 6 4 1,2 1,2
2
securing the scene?
C What is document evidence? How to collect
6 4 1,2 1 1,3
document evidence in lab?
A How to collect evidence in private sector
5 5 1,5,8 1,3 1,3
incident scenes?
5 B Discuss Safety tips to avoid financial 6 5 1,8,1 3 2
&matrimonial frauds. 2
C A man has been arrested by the crime branch of 6 5 3,4 1,2 5
Mumbai police for allegedly sending
threatening text messages to Bollywood actress.
The accused sent four messages to the actress,
,3
threatening to kill her children if she did not
pay him, say sources. How do mobile device
forensics on this case?
OR
A What is network forensics? explain the 3 modes
5 5 1,6 1 2
of protection in DiD Strategy
B How to perform live Acquisition in computer
6 5 1,2 2 3
6 forensic?
C A parent was concerned that his son was
accessing unwanted websites from his
computer. Each time the computer was checked
6 5 3,4 1,3 4,5
by a technician, no evidence was found. How
would a computer forensic service go about
investigating this incident.
A Elaborate Validating and testing forensics
6 6 1,6,8 2 1
software E-mail investigations.
B Demonstrate the use of computer forensic
7 hardware and software tools used to solve the 6 6 5 2 3
different types of forensics.
C Exploring the role of e-mail in investigation. 6 6 1,12 1,3 3
OR
A Classify the software forensic tools and
6 6 2,5 1,2 2
hardware forensic tools.
B Describe tasks in investigating e-mail crimes 1,8,1
6 6 1 2
8 and violations? 2
C Consider the situations, employer files have
been deleted, disks have been reformatted or
other steps have been taken to conceal or 1,2
6 6 3,5,8 4
destroy the evidence. How to recover evidence ,3
using any forensic tool to safe guard the
employee?

You might also like