Exam Details
Subject | Digital forensics | |
Paper | ||
Exam / Course | PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | June, 2016 | |
City, State | new delhi, |
Question Paper
1. FTC stands for
Federal Trade Commission
Federal Trade Commissioner
Federal Trade Command
None of these
2. RSA is key cryptosystem.
3. DDOS stands for
4. A attacker entices computer to log into a computer, which is set up as an AP (Access Point).
5. is a collection of infected computers or hots that have been taken over by hackers and are used to perform malicious tasks or functions.
6. is a digital object that contains reliable information that supports or refutes a hypothesis.
7. is a computer program that can copy itself and infect a computer.
8. An is a form of internet text messaging or synchronous conferencing.
9. WAP stands for Wired Application Protocol
True
False
10. "PCP" stands for
11. What is Spoofing?
12. What is 'Identity theft'? Define types of data theft.
13. What is exculpatory evidence?
14. Differentiate "copy of the drive" and "imaging of the drive".
15. What are three major phases of Digital Forensics?
16. What is Money laundering?
17. Explain the advantages and disadvantages of software based firewall and hardware based firewall.
18. What are some initial assessment you should make for a computing investigation
19. Explain "Log File Analysis". What is "File Carving" in Data recovery? What is salvaging of data
20. What is Intrusion Detection System? How does it different from firewall? Define IPS.
21. Write a short note on the following:
Cyber bullying
SIM Card Acquisition
Cyber Terrorism
Admissible Evidence
Logic Bomb
Federal Trade Commission
Federal Trade Commissioner
Federal Trade Command
None of these
2. RSA is key cryptosystem.
3. DDOS stands for
4. A attacker entices computer to log into a computer, which is set up as an AP (Access Point).
5. is a collection of infected computers or hots that have been taken over by hackers and are used to perform malicious tasks or functions.
6. is a digital object that contains reliable information that supports or refutes a hypothesis.
7. is a computer program that can copy itself and infect a computer.
8. An is a form of internet text messaging or synchronous conferencing.
9. WAP stands for Wired Application Protocol
True
False
10. "PCP" stands for
11. What is Spoofing?
12. What is 'Identity theft'? Define types of data theft.
13. What is exculpatory evidence?
14. Differentiate "copy of the drive" and "imaging of the drive".
15. What are three major phases of Digital Forensics?
16. What is Money laundering?
17. Explain the advantages and disadvantages of software based firewall and hardware based firewall.
18. What are some initial assessment you should make for a computing investigation
19. Explain "Log File Analysis". What is "File Carving" in Data recovery? What is salvaging of data
20. What is Intrusion Detection System? How does it different from firewall? Define IPS.
21. Write a short note on the following:
Cyber bullying
SIM Card Acquisition
Cyber Terrorism
Admissible Evidence
Logic Bomb
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Application and business Security developments
- Bcp, dr planning and audit
- Cyber security
- Digital forensics
- Introduction to Information Security
- Network security
- Policy, Standards And Laws