0% found this document useful (0 votes)
11 views

CF Questions Bank

Notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

CF Questions Bank

Notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Disclaimer

1. This Question Bank has been compiled for the sole purpose of aiding your preparation for the upcoming
examinations. Please be advised that the questions provided herein are intended for reference and practice
purposes only.
2. Please note that even though the Question Bank encompasses a wide range of topics, the questions contained
herein may or may not align with those featured in the final examination paper. The examination questions
may vary in structure, emphasis, or specific details.
----------------------------------------------------------------------------------------------------------------------------- ---------

Course Code: USCS5041


Course Type: Skill Enhancement Elective 2
Course Name: Cyber Forensics

Unit No: I
• What is Cyber forensics? Explain Need of it.
• Write a note on Forensic Triad.
• Explain Role of maintaining Professional Conduct in cybercrime
investigation
• State and Explain steps in Computer/Cyber Forensic
Investigation Process.
• Explain procedures for private sector High-Tech Investigations
as an Investigator.
• How to set up your workstation for digital Forensics?
• Write a note on Digital Evidence
• Explain Storage Formats for Digital Evidence.
• Explain in detail the field of digital forensics.
• Briefly explain how to prepare for computer investigations.
• Differentiate between public-sector and private-sector
investigations.
• Explain the importance of maintaining professional conduct.
• Summarize how to prepare a digital forensics investigation by
taking a systematic approach.
• What are the required procedures for private-sector digital
investigations?

T. Y. B. Sc. Computer Science (R-2023) (Sem - V) Page | 21


Disclaimer
1. This Question Bank has been compiled for the sole purpose of aiding your preparation for the upcoming
examinations. Please be advised that the questions provided herein are intended for reference and practice
purposes only.
2. Please note that even though the Question Bank encompasses a wide range of topics, the questions contained
herein may or may not align with those featured in the final examination paper. The examination questions
may vary in structure, emphasis, or specific details.
----------------------------------------------------------------------------------------------------------------------------- ---------

• Explain the necessary requirements for data recovery


workstations and software.
• What are the certification requirements for digital forensics
labs?
• Describe all the physical requirements for a digital forensics lab.
• Explain the criteria for selecting a basic forensic workstation.
• Describe the components used to build a business case for
developing a forensics lab.
• List the digital evidence storage formats?
• Explain the methods to determine the best acquisition method.
• What is contingency planning for data acquisitions?
• Describe various methods on how to use acquisition tools.
• Describe RAID acquisition methods.
• Briefly explain how to use remote network acquisition tools.
• List other forensics tools available for data acquisitions.
• Explain the following terms:
1) Raw Format
2) Proprietary Format
3) Advance Forensic Format
• How to determine the best Data Acquisition Method?
• Explain Types of Acquisition methods.
• What do you understand about Contingency Planning for Image
Acquisitions?
• List and Explain Different Acquisition Tools.

T. Y. B. Sc. Computer Science (R-2023) (Sem - V) Page | 22


Disclaimer
1. This Question Bank has been compiled for the sole purpose of aiding your preparation for the upcoming
examinations. Please be advised that the questions provided herein are intended for reference and practice
purposes only.
2. Please note that even though the Question Bank encompasses a wide range of topics, the questions contained
herein may or may not align with those featured in the final examination paper. The examination questions
may vary in structure, emphasis, or specific details.
----------------------------------------------------------------------------------------------------------------------------- ---------
Unit No: II
• Write a note on Identifying Digital Evidence.

• Explain the steps involved in preparing for search and seizure of


computers or digital devices in digital investigations?

• What are the best ways to determine the tools you need for
digital Investigation.

• Write a note on Securing a Digital Incident or Crime scene.

• Explain Processing incident or crime scene.

• Write a note on Storing Digital Evidence.

• How to Document the Evidence? What are the precautions


needs to take during Documenting Evidence.

• Explain Types of Digital Forensics Tools.

• Write a note on Determining what data to collect and analyse


during computer forensics analysis and Validation.

• Explain different types of Computer forensic tools.

• Write a note on data hiding techniques in detail.

• Write a note on recovering graphic files.

• Explain implementation of steganography in graphics files.

• Describe how to collect evidence at private-sector from incident


scenes.

• What are the guidelines for processing law enforcement crime


scenes?

• What are the steps in preparing for an evidence search?

T. Y. B. Sc. Computer Science (R-2023) (Sem - V) Page | 23


Disclaimer
1. This Question Bank has been compiled for the sole purpose of aiding your preparation for the upcoming
examinations. Please be advised that the questions provided herein are intended for reference and practice
purposes only.
2. Please note that even though the Question Bank encompasses a wide range of topics, the questions contained
herein may or may not align with those featured in the final examination paper. The examination questions
may vary in structure, emphasis, or specific details.
----------------------------------------------------------------------------------------------------------------------------- ---------

• Describe how to secure a computer incident or crime scene.

• Explain the necessary guidelines for seizing digital evidence at a


crime scene.

• What are the procedures for storing digital evidence?

• Explain how to obtain a digital hash.

• Explain how to evaluate needs for digital forensics tools.

• Describe available digital forensics software tools.

• What are the basic considerations for digital forensics hardware


tools?

• What are the methods for validating and testing forensics tools?

• Describe the types of graphics in file formats.

• Explain types of data compression.

• Explain how to locate and recover graphics files.

• What is the process in identifying unknown file formats?

• How do we determine the data to analyse in a digital forensics


investigation?

• Explain tools used to validate data.

• Explain common data-hiding techniques.

• Describe Linux file structures.

• Briefly explain copyright issues with graphics.

T. Y. B. Sc. Computer Science (R-2023) (Sem - V) Page | 24


Disclaimer
1. This Question Bank has been compiled for the sole purpose of aiding your preparation for the upcoming
examinations. Please be advised that the questions provided herein are intended for reference and practice
purposes only.
2. Please note that even though the Question Bank encompasses a wide range of topics, the questions contained
herein may or may not align with those featured in the final examination paper. The examination questions
may vary in structure, emphasis, or specific details.
----------------------------------------------------------------------------------------------------------------------------- ---------
Unit No: III
• What are Network Forensics?
• Explain Standard procedures for Network Forensics.
• Explain Network forensics Tools.

• How to select tool for Live Response?


• Explain Network Forensics Tools Collection best practices.
• How to perform Live data Collection on Microsoft windows
System?
• How to perform Live data Collection on Unix-Based System?
• Explain the role of Email in Investigations.
• Write a note on Email Headers.
• Explain Tools and techniques to investigate Email messages.
• Explain Email Forensics Tools.
• Explain Acquisition procedures for mobile devices.
• Write a note on SIM card.
• Explain importance of Investigation Reports.
• What are the Guidelines Need to be followed for Writing
Reports?
• Explain Reporting Standards.
• What are the standard procedures for conducting forensic
analysis of virtual machines?
• Describe the process of performing a live acquisition of a
system.
• Explain how network intrusions and unauthorized access can
be investigated through network forensics expert.

T. Y. B. Sc. Computer Science (R-2023) (Sem - V) Page | 25


Disclaimer
1. This Question Bank has been compiled for the sole purpose of aiding your preparation for the upcoming
examinations. Please be advised that the questions provided herein are intended for reference and practice
purposes only.
2. Please note that even though the Question Bank encompasses a wide range of topics, the questions contained
herein may or may not align with those featured in the final examination paper. The examination questions
may vary in structure, emphasis, or specific details.
----------------------------------------------------------------------------------------------------------------------------- ---------

• What are some standard procedures and tools used in network


forensics?
• What is the role of email in digital investigations?
• Explain the difference between email clients and servers.
• What techniques can be used to investigate email crimes or
policy violations?
• How can email server logs be used in an investigation?
• Give examples of specialized email forensic tools and their use.
• Briefly explain how digital forensics can be applied to social
media investigations.
• What are some basic concepts of mobile device forensics?
• Describe the procedures for acquiring forensic data from mobile
devices.
• What are some challenges with acquiring IoT device data
forensically?
• Explain the importance of report writing in forensic
investigations.
• What should be included in a forensic investigation report?
• How can forensic tools assist in generating investigative reports?
• What are the guidelines for providing witness testimony?
• What should be done to prepare for testifying in court?
• How does testimony in depositions differ from court?
• What rules apply when testifying in hearings?

T. Y. B. Sc. Computer Science (R-2023) (Sem - V) Page | 26

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy