Exam Details
Subject | cyber security & forensics (csf) | |
Paper | ||
Exam / Course | mca | |
Department | ||
Organization | Gujarat Technological University | |
Position | ||
Exam Date | May, 2018 | |
City, State | gujarat, ahmedabad |
Question Paper
1
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA SEMESTER 5 • EXAMINATION SUMMER 2018
Subject Code: 650008 Date: 07-May-2018
Subject Name: Cyber Security and Forensics
Time: 10.30 am to 1.00 pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
How do we classify cybercrimes? Explain each one briefly.
07
What is social engineering? Explain its classification.
07
Q.2
What is phishing attack? Explain its types.
07
Explain in brief Digital Forensics Life Cycle.
07
OR
Explain Botnets fuel for cybercrime.
07
Q.3
Differentiate between virus and worms.
07
Explain Identity Theft in detail with example.
07
OR
Q.3
Write a note on SQL injection attack.
07
Write a note on Forensics Auditing.
07
Q.4
Explain types of attacks on mobile devices.
07
Explain strong, weak and random passwords.
07
OR
Q.4
Describe briefly toolkits for hand-held device forensics.
07
Explain the major amendments to the Indian IT Act in ITA 2008.
07
Q.5
Write a note on attack vector.
07
Discuss challenges in Computer Forensics.
07
OR
Q.5
Explain forensic analysis of E-mail.
07
Explain steganography.
07
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA SEMESTER 5 • EXAMINATION SUMMER 2018
Subject Code: 650008 Date: 07-May-2018
Subject Name: Cyber Security and Forensics
Time: 10.30 am to 1.00 pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
How do we classify cybercrimes? Explain each one briefly.
07
What is social engineering? Explain its classification.
07
Q.2
What is phishing attack? Explain its types.
07
Explain in brief Digital Forensics Life Cycle.
07
OR
Explain Botnets fuel for cybercrime.
07
Q.3
Differentiate between virus and worms.
07
Explain Identity Theft in detail with example.
07
OR
Q.3
Write a note on SQL injection attack.
07
Write a note on Forensics Auditing.
07
Q.4
Explain types of attacks on mobile devices.
07
Explain strong, weak and random passwords.
07
OR
Q.4
Describe briefly toolkits for hand-held device forensics.
07
Explain the major amendments to the Indian IT Act in ITA 2008.
07
Q.5
Write a note on attack vector.
07
Discuss challenges in Computer Forensics.
07
OR
Q.5
Explain forensic analysis of E-mail.
07
Explain steganography.
07
Other Question Papers
Subjects
- advance database management system
- advanced biopharmaceutics & pharmacokinetics
- advanced medicinal chemistry
- advanced networking (an)
- advanced organic chemistry -i
- advanced pharmaceutical analysis
- advanced pharmacognosy-1
- advanced python
- android programming
- artificial intelligence (ai)
- basic computer science-1(applications of data structures and applications of sql)
- basic computer science-2(applications of operating systems and applications of systems software)
- basic computer science-3(computer networking)
- basic computer science-4(software engineering)
- basic mathematics
- basic statistics
- big data analytics (bda)
- big data tools (bdt)
- chemistry of natural products
- cloud computing (cc)
- communications skills (cs)
- computer aided drug delivery system
- computer graphics (cg)
- computer-oriented numerical methods (conm)
- cyber security & forensics (csf)
- data analytics with r
- data mining
- data structures (ds)
- data visualization (dv)
- data warehousing
- data warehousing & data mining
- database administration
- database management system (dbms)
- design & analysis of algorithms(daa)
- digital technology trends ( dtt)
- discrete mathematics for computer science (dmcs)
- distributed computing (dc1)
- drug delivery system
- dynamic html
- enterprise resource planning (erp)
- food analysis
- function programming with java
- fundamentals of computer organization (fco)
- fundamentals of java programming
- fundamentals of networking
- fundamentals of programming (fop)
- geographical information system
- image processing
- industrial pharmacognostical technology
- information retrieving (ir)
- information security
- java web technologies (jwt)
- language processing (lp)
- machine learning (ml)
- management information systems (mis)
- mobile computing
- molecular pharmaceutics(nano tech and targeted dds)
- network security
- object-oriented programming concepts & programmingoocp)
- object-oriented unified modelling
- operating systems
- operation research
- operations research (or)
- pharmaceutical validation
- phytochemistry
- procedure programming in sql
- programming skills-i (ps-i-fop)
- programming skills-ii (ps-oocp)
- programming with c++
- programming with java
- programming with linux, apache,mysql, and php (lamp)
- programming with python
- search engine techniques (set)
- soft computing
- software development for embedded systems
- software engineering
- software lab (dbms: sql & pl/sql)
- software project in c (sp-c)
- software project in c++ (sp-cpp)
- software quality and assurance (sqa)
- statistical methods
- structured & object oriented analysis& design methodology
- system software
- virtualization and application of cloud
- web commerce (wc)
- web data management (wdm)
- web searching technology and search engine optimization
- web technology & application development
- wireless communication & mobile computing (wcmc)
- wireless sensor network (wsn)