GISF Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day
Getting ready for the GISF certification? Our GISF Exam Prep Free resource includes 50 exam-style questions designed to help you practice effectively and feel confident on test day
Effective GISF exam prep free is the key to success. With our free practice questions, you can:
- Get familiar with exam format and question style
- Identify which topics you’ve mastered—and which need more review
- Boost your confidence and reduce exam anxiety
Below, you will find 50 realistic GISF Exam Prep Free questions that cover key exam topics. These questions are designed to reflect the structure and challenge level of the actual exam, making them perfect for your study routine.
Mark works as a Customer Support Technician for uCertify Inc. The company provides troubleshooting support to users. Mark is troubleshooting a computer of a user who is working on Windows Vista. The user reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center should Mark configure to save the user's data?
A. Automatic updating
B. Firewall
C. Malware protection
D. Content Advisor
Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?
A. Preparation phase
B. Eradication phase
C. Differential phase
D. Identification phase
You are the Administrator for a corporate network. You are concerned about denial of service attacks. Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?
A. Shorten the timeout for connection attempts.
B. Place a honey pot in the DMZ.
C. Implement a strong password policy.
D. Implement network based antivirus.
Which of the following network connectivity devices translates one protocol into another and is used to connect dissimilar network technologies?
A. Hub
B. Firewall
C. Bridge
D. Gateway
Which of the following are the differences between routed protocols and routing protocols? Each correct answer represents a complete solution. Choose two.
A. A routing protocol is configured on an interface and decides the method of packet delivery.
B. A routing protocol decides the path for a packet through the network.
C. A routed protocol is configured on an interface and decides how a packet will be delivered.
D. A routed protocol works on the transport layer of the OSI model.
Which of the following statements about Secure Shell (SSH) are true? Each correct answer represents a complete solution. Choose three.
A. It was designed as a replacement for TELNET and other insecure shells.
B. It is a network protocol used primarily on Linux and Unix based systems.
C. It allows data to be exchanged using a secure channel between two networked devices.
D. It is the core routing protocol of the Internet.
Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?
A. Public key
B. Digital certificates
C. Twofish
D. RSA
Which of the following is NOT a phase of the OODA Loop strategy?
A. Observe
B. Define
C. Orient
D. Act
Which of the following is the primary function of VPNs?
A. To establish private connections over public networks
B. To make virtual connections for remote access
C. To establish a wireless connections to networks
D. To access networks remotely
Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?
A. Asymmetric
B. Symmetric
C. Numeric
D. Hashing
Which of the following is used to determine whether or not a principal is allowed to perform a requested action?
A. Authentication
B. Security policy
C. Authorization
D. Principal
John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He analyzes that the company has blocked all ports except port 80. Which of the following attacking methods can he use to send the dangerous software protocols?
A. HTTP tunneling
B. URL obfuscation
C. Banner grabbing
D. MAC spoofing
Which of the following is a pillar of Information Assurance CIA triad?
A. Integrity
B. Affiliation
C. Accessibility
D. Isolation
Which of the following is the best approach to conflict resolution?
A. Hard work and understanding
B. Mutual respect and cooperation
C. Flexibility
D. Sincerity and hard work
Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?
A. Trademark laws
B. Patent laws
C. Copyright laws
D. Code Security law
In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?
A. Bandwidth
B. Load
C. Delay
D. Frequency
Which of the following refers to encrypted text?
A. Plaintext
B. Cookies
C. Ciphertext
D. Hypertext
Which of the following categories of the network management model is used to detect and log network problems or device failures?
A. Fault Management
B. Configuration Management
C. Security Management
D. Performance Management
Which of the following IDS/IPS detection methods do the URLs use to detect and prevent an attack?
A. Encryption-based detection
B. Policy-based detection
C. Signature-based detection
D. Internet bot detection
Web applications play a vital role in deploying different databases with user accessibility on the Internet. Which of the following allows an attacker to get unauthorized access to the database of a Web application by sending (attacking) user-supplied data to an interpreter as part of a command or query?
A. Cross Site Scripting
B. Injection flaw
C. Cross Site Request Forgery (CSRF)
D. Malicious File Execution
Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?
A. Risk acceptance
B. Risk transfer
C. Risk avoidance
D. Risk mitigation
Which of the following are the types of Intrusion detection system?
A. Server-based intrusion detection system (SIDS)
B. Client based intrusion detection system (CIDS)
C. Host-based intrusion detection system (HIDS)
D. Network intrusion detection system (NIDS)
In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?
A. Bandwidth
B. Load
C. Delay
D. Frequency
Which of the following statements are true about Dsniff? Each correct answer represents a complete solution. Choose two.
A. It is a virus.
B. It contains Trojans.
C. It is antivirus.
D. It is a collection of various hacking tools.
Which of the following types of viruses can prevent itself from being detected by an antivirus application?
A. File virus
B. Boot sector virus
C. Multipartite virus
D. Stealth virus
You are the project manager for a software technology company. You and the project team have identified that the executive staff is not fully committed to the project. Which of the following best describes the risk?
A. Residual risks
B. Trend analysis
C. Schedule control
D. Organizational risks
You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
A. Quantitative analysis
B. Qualitative analysis
C. Estimate activity duration
D. Risk identification
The security of a computer against the unauthorized usage largely depends upon the efficiency of the applied access control method. Which of the following statements are true about a computer access control method? Each correct answer represents a complete solution. Choose all that apply.
A. It can be based upon fingerprint or eye recognition.
B. It can be time-synchronous.
C. It provides security against the virus attacks.
D. It provides security against Eavesdropping.
E. It checks the authenticity of a person.
F. It is used to encrypt a message before transmitting it on a network.
You are the Network Administrator for a company that frequently exchanges confidential emails without outside parties (clients, vendors, etc.). You want those emails to be encrypted, however, you want the least overhead/difficulty in the encryption process. Which of the following should you choose?
A. MD5
B. DES
C. Symmetric Encryption
D. Asymmetric Encryption
Which of the following statements about Encapsulating Security Payload (ESP) are true? Each correct answer represents a complete solution. Choose two.
A. It can also be nested with the Layer Two Tunneling Protocol (L2TP).
B. It is an IPSec protocol.
C. It is a text-based communication protocol.
D. It uses TCP port 22 as the default port and operates at the application layer.
You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.
A. Recovery
B. Contamination
C. Identification
D. Eradication
E. Preparation
Which of the following combines the characteristics of a bridge and a router?
A. Firewall
B. Brouter
C. Switch
D. Hub
E. Repeater
Which of the following are parts of applying professional knowledge? Each correct answer represents a complete solution. Choose all that apply.
A. Maintaining cordial relationship with project sponsors
B. Reporting your project management appearance
C. Staying up-to-date with project management practices
D. Staying up-to-date with latest industry trends and new technology
Mark works as a Network Administrator for NetTech Inc. The network uses routers from multiple vendors. Mark wants to implement a routing protocol on the company's network that provides VLSM support, scalability and minimal overhead on the network. Which of the following protocols will Mark use to fulfill the requirements?
A. RIPv1
B. EIGRP
C. CDP
D. OSPF
You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista. He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data?
A. Malware protection
B. Automatic updating
C. Firewall
D. Other security settings
Each time you start your computer, you receive an error message that your TCP/IP address is in use. Which of the following attacks is this?
A. Worm attack
B. ICMP attack
C. Back door attack
D. TCP/IP hijacking
E. TCP Sequence Number attack
F. TCP SYN or TCP ACK flood attack
You work as an Application Developer for uCertify Inc. The company uses Visual Studio .NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?
A. Kerberos
B. HTTPS
C. RSA
D. IPSEC
The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?
A. Biometric devices
B. Intrusion detection systems
C. Key card
D. CCTV Cameras
Which of the following tools is an open source protocol analyzer that can capture traffic in real time?
A. Snort
B. Wireshark
C. NetWitness
D. Netresident
Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data?
A. Symmetric
B. Numeric
C. Hashing
D. Asymmetric
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?
A. Operational audit
B. Non-operational audit
C. Independent audit
D. Dependent audit
Which of the following types of attack can guess a hashed password?
A. Teardrop attack
B. Evasion attack
C. Denial of Service attack
D. Brute force attack
Which of the following statements is not true about a digital certificate?
A. It is used with both public key encryption and private key encryption.
B. It is used with private key encryption.
C. It is neither used with public key encryption nor with private key encryption.
D. It is used with public key encryption.
Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?
A. Smurf DoS attack
B. Teardrop attack
C. Fraggle DoS attack
D. Ping flood attack
You work as a Network Administrator for Tech World Inc. The company has a TCP/IP-based router. You have configured a router on your network. You want to accomplish the following goals: l Configure the router to require a password to move from user EXEC mode to privileged EXEC mode. l The password must be listed as a hidden entry in the configuration file. You run the following command: enable password Which of the goals will this action accomplish?
A. The password will be listed as a hidden entry in the configuration file
B. The action will accomplish neither of the goals
C. The action will accomplish both the goals
D. The router will require a password to move from user EXEC mode to privileged EXEC mode
Mark is implementing security on his e-commerce site. He wants to ensure that a customer sending a message is really the one he claims to be. Which of the following techniques will he use to ensure this?
A. Packet filtering
B. Authentication
C. Firewall
D. Digital signature
Which of the following refers to the ability to ensure that the data is not modified or tampered with?
A. Availability
B. Integrity
C. Confidentiality
D. Non-repudiation
Which of the following is the process of making additional copies of data so that they may be used to restore the original after a data loss event?
A. Data mining
B. Back-up
C. Data recovery
D. File storage
Which of the following types of firewalls looks deep into packets and makes granular access control decisions?
A. Stateful
B. Application level proxy
C. Circuit level proxy
D. Packet filtering
Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?
A. American Bankers Association
B. Central Security Service (CSS)
C. National Institute of Standards and Technology (NIST)
D. International Telecommunications Union
E. Request for Comments (RFC)
F. National Security Agency (NSA)
Access Full GISF Exam Prep Free
Want to go beyond these 50 questions? Click here to unlock a full set of GISF exam prep free questions covering every domain tested on the exam.
We continuously update our content to ensure you have the most current and effective prep materials.
Good luck with your GISF certification journey!