0% found this document useful (0 votes)
18 views3 pages

Ehdf Pyq Sem6

The document outlines various topics related to ethical hacking, penetration testing, incident response, and digital forensics across multiple chapters. It includes definitions, methodologies, tools, and processes involved in these fields, as well as the importance of evidence handling and forensic analysis. Additionally, it emphasizes the need for ethical practices and the challenges faced in forensic investigations.

Uploaded by

vikasbrain87
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views3 pages

Ehdf Pyq Sem6

The document outlines various topics related to ethical hacking, penetration testing, incident response, and digital forensics across multiple chapters. It includes definitions, methodologies, tools, and processes involved in these fields, as well as the importance of evidence handling and forensic analysis. Additionally, it emphasizes the need for ethical practices and the challenges faced in forensic investigations.

Uploaded by

vikasbrain87
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

EHDF

Chapter 1:
1] Define footprinting and explain different footprinting tools. [5m] [imp]
2] e. Define ethical hacking and explain the types of hackers and phases of hacking.
[5m] [V.V.IMP]
3] write short note on [5m each]
a.​ Enumeration techniques and tools [IMP]
b.​ Ethical hacking.
4] What are the key concepts of Ethical Hacking? [5m]​
5] What is ethical hacking? Describe the steps of the ethical hacking process. [10m]

Chapter 2:
1] Define penetration testing and describe how social engineering can aid penetration.
[5m]
2] Compare Google Hacking (GHDB) and doxing in information gathering. [10m] [self
learning topic] [topper ko chod ke sab skip kro]
3] List and discuss various system hacking tools. [5m] [imp]
4] Explain penetration testing with its various phases? Also explain how social
engineering can be used for penetration testing. [10m] [IMP]
5] Explain various stages in penetration testing. [10m] [IMP]

Chapter 3:
1] Explain the goals of incident response and describe its methodology with a suitable
diagram. [10m]
2] Define digital forensics? Explain types of digital forensics. [5m] [imp]
3] Explain the process of Digital Forensics. [10m]
4] Define digital forensics. Explain the need of digital forensics along with the lifecycle of
digital forensics. [10m]
5] Explain the goal of incident response. Mention incidence response methodology with
suitable diagram. [10m]
6] Explain incident response methodology in detail. [10m]
7] Explain forensic analysis of data acquired from any one operating system. [10m]

Chapter 4 :
1] Explain forensic duplicates as admissible evidence. [5m]
3] Explain the importance of forensics duplication and its methods. [10m] [imp]
4] What is FTK Imager and what are its main functionalities in digital forensics? How
does FTK Imager handle different file systems and partitions during the imaging
process? [10m]
5] Explain the data acquisition in network forensics in detail. [10m]

Chapter 5
1] Write short note on the following: (any two) [10m each]
a.​ Volatile data collection for Windows system.
b.​ Analysis of forensics data in Linux system [imp]
c.​ Data carving and various tools of forensic analysis [imp]
2] Define data carving and differentiate its methods for forensic analysis. [10m]
3] Explain forensic analysis of data acquired from any one operating system. [imp]
4] How can email be used as evidence? [5m]
5] Point out the features of Forensic Duplication and Investigation & also outline the
problems and challenges forensic examiners face when preparing and processing
investigations, including the ideas and questions they must consider. [10m] [imp]
6] Explain investigation triad in detail. [5m]
7] Briefly explain the types of digital evidence with examples. [10m]
8] Design a strategy to address cross-jurisdictional challenges in forensic investigations.
[10m]

Chapter 6
1] Discuss the challenges in evidence handling. [5m]
2] Briefly explain the roles of an expert witness and a scientific witness. [5m] [imp]
3] Explain the guidelines for digital forensics report writing along with its goals and with
a suitable example. [10m] [imp]
4] What do you mean by chain of custody in Digital forensics. What steps should a
digital forensics investigator take to ensure the integrity of evidence throughout the
chain of custody? [10m] [imp]
5] What is a Faraday bag and how does it work in the context of digital forensics? Can
Faraday bags also be used to preserve evidence integrity during the collection and
transportation of electronic devices? [10m]

MIX Chapter question


1] Explain the following terms in detail (any five): (5 × 2 = 10)
a.​ Forensic duplicates
b.​ Qualified forensic duplicates
c.​ Mirror image
d.​ Chain of custody
e.​ Evidence bags
f.​ Restored image
g.​ Bitstream image
h.​ Evidence custody form
i.​ Repeatable findings
j.​ Forensic workstations

You might also like