0% found this document useful (0 votes)
13 views2 pages

CSC 3243 COMPUTER FORENSICS

The document outlines the examination structure for a Computer Forensics course at St. Paul's University, detailing compulsory and optional questions for students. It covers various topics such as forensic science terminology, investigation processes, evidence handling, and digital evidence acquisition. The exam is scheduled for August 2023 and consists of multiple sections with specific marks allocated to each question.

Uploaded by

colindeveloper4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views2 pages

CSC 3243 COMPUTER FORENSICS

The document outlines the examination structure for a Computer Forensics course at St. Paul's University, detailing compulsory and optional questions for students. It covers various topics such as forensic science terminology, investigation processes, evidence handling, and digital evidence acquisition. The exam is scheduled for August 2023 and consists of multiple sections with specific marks allocated to each question.

Uploaded by

colindeveloper4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

ST.

PAUL’S UNIVERSITY
S

UN
P A U L ’
Private Bag 00217 Limuru, 00217, KENYA

I VE R S I TY
Tel: 020-2020505/2020510/0728-669000/0736-424440
.
S T

SE R TY
VANT
S OF GO D AND HUMANI

SCHOOL OF COMMUNICATION AND COMPUTER STUDIES


BACHELOR OF SCIENCE IN COMPUTER SCIENCE
MAY-AUGUST 2022/2023 SEMESTER

CSC 3243: COMPUTER FORENSICS

DATE: AUGUST, 2023 TIME: 2 hours


INSTRUCTIONS
Section a is compulsory. Answer any other two questions in section b.

SECTION A (COMPULSORY – this section carries 30 Marks)


Question One
a) Differentiate the terms as used in forensic science: (6 Marks)
i. Forensic Image and Digital forensic
ii. Chain of Custody and Order of Volatility
iii. Live acquisition and post mortem acquisition
b) Outline the basic steps of the forensic investigation process. (6 Marks)
c) State and briefly explain any three factors that affect back-up digital evidence (6 Marks)
d) Describe any three basic scientific principles for the forensic investigation process.
(6 Marks)
e) Cell phones and mobile devices have often been used in committing crimes. What are the two main
concerns in the search and seizure procedures for cell phones and mobile devices? Give reasons for
these concerns (4 Marks)
f) Explain two main benefits of professional forensics methodology (2 Marks)

Page 1 of 2
SECTION B: ANSWER ANY TWO QUESTIONS FROM THIS SECTION
QUESTION 2 (20 MARKS)
a) In order to maintain the integrity of evidence, the claim of custody procedures must be strictly
observed. Describe THREE (3) of the chain of custody procedures. (6 Marks)
b) Explain three functions of computer forensic tools (6 Marks)
c) Explain two current challenge areas for digital forensics (4 Marks)
d) Explain the special needs of evidential authentication in forensic science (4 Marks)

Question Three
a) You are given a hard disk belonging to a suspected criminal. Explain the complete steps to make
forensic copy of the hard disk. The steps should start immediately after you have received the
suspected criminal hard disk. Do not forget to include the steps for change of custodian procedure
and case documentation. (8 Marks)
b) Describe how data backup and recovery is done in computer forensics (6 Marks)
c) Discuss the process of seizing of digital evidence at the scene (6 Marks)

QUESTION 4 (20 MARKS)


a) Differentiate between electronic and digital signatures (4 Marks)
b) Explain the following terms as used in computer forensics
i) Bit of stream Image
ii) Evidence bag (4 Marks)
c) Identify THREE data acquisition methods we use in digital forensics. (6 Marks)
d) State any THREE types of evidence (6 Marks)

QUESTION 5 (20 Marks)


a) In the context of digital forensic analysis, explain the following terms:
i. Alternate Data Streams (2 Marks)
ii. Steganography (2 Marks)
b) Explain three resources required for computer forensic investigation (6 Marks)
c) Explain three requirements on setting computer forensic workstation (6 Marks)
d) Explain three reasons for securing crime scene, indicating the person who secures the scene.
(4 Marks)

Page 2 of 2

You might also like