Exam Details
Subject | cyber security & forensics (csf) | |
Paper | ||
Exam / Course | mca | |
Department | ||
Organization | Gujarat Technological University | |
Position | ||
Exam Date | June, 2017 | |
City, State | gujarat, ahmedabad |
Question Paper
1
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA SEMESTER- V• EXAMINATION -SUMMER 2017
Subject Code: 2650008 Date:06/06/2017
Subject Name: Cyber Security And Forensics
Time: 02.30 PM TO 05.00 PM Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
Explain the possible attacks on cell phones with examples.
07
Explain the various phases and activities involved in the life cycle of a forensics investigation process.
07
Q.2
State the salient features of the Indian IT Act.
07
Explain the different phases during the attack on network.
07
OR
Explain Proxy Servers, Anonymizers
07
Q.3
Explain Salami Attack/Technique, Data Diddling in detail with examples.
07
Explain the difference between active and passive attacks.
07
OR
Q.3
Explain Mishing, Vishing, Smishing.
07
Explain the types and techniques of Credit Card Frauds.
07
Q.4
Explain the modus operandi of Phishing
07
Explain the techniques of ID theft
07
OR
Q.4
Explain the weak area of Indian Information Technology Act, 2000.
07
Explain Rootkits, Information Hiding with respect to Computer Forensics and Steganography.
07
Q.5
Explain the hardware and software features of cell phones.
07
Explain cyber stalking with example.
07
OR
Q.5
Explain mobile phone forensics in detail.
07
Explain SQL Injection in detail along with methods to prevent SQL Injection attacks.
07
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA SEMESTER- V• EXAMINATION -SUMMER 2017
Subject Code: 2650008 Date:06/06/2017
Subject Name: Cyber Security And Forensics
Time: 02.30 PM TO 05.00 PM Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
Explain the possible attacks on cell phones with examples.
07
Explain the various phases and activities involved in the life cycle of a forensics investigation process.
07
Q.2
State the salient features of the Indian IT Act.
07
Explain the different phases during the attack on network.
07
OR
Explain Proxy Servers, Anonymizers
07
Q.3
Explain Salami Attack/Technique, Data Diddling in detail with examples.
07
Explain the difference between active and passive attacks.
07
OR
Q.3
Explain Mishing, Vishing, Smishing.
07
Explain the types and techniques of Credit Card Frauds.
07
Q.4
Explain the modus operandi of Phishing
07
Explain the techniques of ID theft
07
OR
Q.4
Explain the weak area of Indian Information Technology Act, 2000.
07
Explain Rootkits, Information Hiding with respect to Computer Forensics and Steganography.
07
Q.5
Explain the hardware and software features of cell phones.
07
Explain cyber stalking with example.
07
OR
Q.5
Explain mobile phone forensics in detail.
07
Explain SQL Injection in detail along with methods to prevent SQL Injection attacks.
07
Other Question Papers
Subjects
- advance database management system
- advanced biopharmaceutics & pharmacokinetics
- advanced medicinal chemistry
- advanced networking (an)
- advanced organic chemistry -i
- advanced pharmaceutical analysis
- advanced pharmacognosy-1
- advanced python
- android programming
- artificial intelligence (ai)
- basic computer science-1(applications of data structures and applications of sql)
- basic computer science-2(applications of operating systems and applications of systems software)
- basic computer science-3(computer networking)
- basic computer science-4(software engineering)
- basic mathematics
- basic statistics
- big data analytics (bda)
- big data tools (bdt)
- chemistry of natural products
- cloud computing (cc)
- communications skills (cs)
- computer aided drug delivery system
- computer graphics (cg)
- computer-oriented numerical methods (conm)
- cyber security & forensics (csf)
- data analytics with r
- data mining
- data structures (ds)
- data visualization (dv)
- data warehousing
- data warehousing & data mining
- database administration
- database management system (dbms)
- design & analysis of algorithms(daa)
- digital technology trends ( dtt)
- discrete mathematics for computer science (dmcs)
- distributed computing (dc1)
- drug delivery system
- dynamic html
- enterprise resource planning (erp)
- food analysis
- function programming with java
- fundamentals of computer organization (fco)
- fundamentals of java programming
- fundamentals of networking
- fundamentals of programming (fop)
- geographical information system
- image processing
- industrial pharmacognostical technology
- information retrieving (ir)
- information security
- java web technologies (jwt)
- language processing (lp)
- machine learning (ml)
- management information systems (mis)
- mobile computing
- molecular pharmaceutics(nano tech and targeted dds)
- network security
- object-oriented programming concepts & programmingoocp)
- object-oriented unified modelling
- operating systems
- operation research
- operations research (or)
- pharmaceutical validation
- phytochemistry
- procedure programming in sql
- programming skills-i (ps-i-fop)
- programming skills-ii (ps-oocp)
- programming with c++
- programming with java
- programming with linux, apache,mysql, and php (lamp)
- programming with python
- search engine techniques (set)
- soft computing
- software development for embedded systems
- software engineering
- software lab (dbms: sql & pl/sql)
- software project in c (sp-c)
- software project in c++ (sp-cpp)
- software quality and assurance (sqa)
- statistical methods
- structured & object oriented analysis& design methodology
- system software
- virtualization and application of cloud
- web commerce (wc)
- web data management (wdm)
- web searching technology and search engine optimization
- web technology & application development
- wireless communication & mobile computing (wcmc)
- wireless sensor network (wsn)