Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Exam Prep Free

GISP Exam Prep Free

Table of Contents

Toggle
  • GISP Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day
  • Access Full GISP Exam Prep Free

GISP Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day

Getting ready for the GISP certification? Our GISP Exam Prep Free resource includes 50 exam-style questions designed to help you practice effectively and feel confident on test day

Effective GISP exam prep free is the key to success. With our free practice questions, you can:

  • Get familiar with exam format and question style
  • Identify which topics you’ve mastered—and which need more review
  • Boost your confidence and reduce exam anxiety

Below, you will find 50 realistic GISP Exam Prep Free questions that cover key exam topics. These questions are designed to reflect the structure and challenge level of the actual exam, making them perfect for your study routine.

Question 1

?

A. Physically destroying the media and the information stored on it.

B. Assessing the risk involved in discarding particular information.

C. Verifying the identity of a person, network host, or system process.

D. Removing the content from the media so that it is difficult to restore.

 


Suggested Answer: D

 

 

Question 2

Which of the following are tunneling protocols?
Each correct answer represents a complete solution. Choose two.

A. SMTP

B. NNTP

C. L2TP

D. PPTP

 


Suggested Answer: CD

 

 

Question 3

Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers?
Each correct answer represents a complete solution. Choose all that apply.

A. SocketShield

B. Enum

C. KFSensor

D. Sheep dip

 


Suggested Answer: AC

 

 

Question 4

Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?

A. EAP

B. CHAP

C. MS-CHAP v2

D. PAP

 


Suggested Answer: A

 

 

Question 5

?

A. Firewall

B. Internet

C. LAN

D. VPN

 


Suggested Answer: D

 

 

Question 6

You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet.
For security, you want to restrict unauthorized access to the network with minimum administrative effort.
You want to implement a hardware-based solution. What will you do to accomplish this?

A. Connect a brouter to the network.

B. Implement firewall on the network.

C. Connect a router to the network.

D. Implement a proxy server on the network.

 


Suggested Answer: B

 

 

Question 7

provide in an e-commerce system?
Each correct answer represents a complete solution. Choose two.

A. Credit

B. Trust

C. Transparency

D. Identification

 


Suggested Answer: BD

 

 

Question 8

The 802.11b wireless standard has a data transfer speed of up to ________.

A. 11Mbps

B. 110Mbps

C. 54Mbps

D. 56Mbps

 


Suggested Answer: A

 

 

Question 9

Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?

A. IPSec

B. NAT

C. Firewall

D. MAC address

 


Suggested Answer: A

 

 

Question 10

Which of the following is a signature-based intrusion detection system (IDS) ?

A. StealthWatch

B. Snort

C. RealSecure

D. Tripwire

 


Suggested Answer: B

 

 

Question 11

are true?
Each correct answer represents a complete solution. Choose two.

A. It identifies a user who sends a message.

B. It is created by implementing a public-key encryption.

C. It is created by implementing a private-key encryption.

D. It identifies a user who deletes a message.

 


Suggested Answer: AB

 

 

Question 12

Which of the following is the process of overwriting all addressable locations on a disk?

A. Sanitization

B. Authentication

C. Spoofing

D. Drive wiping

 


Suggested Answer: D

 

 

Question 13

Which of the following involves identifying and minimizing the effect of risks?

A. Risk profile

B. Recovery plan

C. Risk plan

D. Risk retention

 


Suggested Answer: C

 

 

Question 14

Which of the following are the major tasks of risk management?
Each correct answer represents a complete solution. Choose two.

A. Building Risk free systems

B. Risk control

C. Risk identification

D. Assuring the integrity of organizational data

 


Suggested Answer: BC

 

 

Question 15

Which of the following services does Internet Information Server (IIS) provide along with HTTP?
Each correct answer represents a complete solution. Choose three.

A. SMTP

B. FTP

C. PPTP

D. NNTP

 


Suggested Answer: ABD

 

 

Question 16

Which of the following defines the communication link between a Web server and Web applications?

A. PGP

B. CGI

C. IETF

D. Firewall

 


Suggested Answer: B

 

 

Question 17

You work as a professional Ethical Hacker. You are assigned a project to test the security of www.we-are-secure.com. You are working on the Windows Server
2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation?
Each correct answer represents a complete solution. Choose all that apply.

A. Use on-screen keyboards and speech-to-text conversion software which can also be useful agains keyloggers, as there are no typing or mouse movements involved.

B. Remove the SNMP agent or disable the SNMP service.

C. Use commercially available anti-keyloggers such as PrivacyKeyboard.

D. Monitor the programs running on the server to see whether any new process is running on the server or not.

 


Suggested Answer: ACD

 

 

Question 18

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He notices that UDP port 137 of the We-are-secure server is open. Assuming that the Network Administrator of We-are-secure Inc. has not changed the default port values of the services, which of the following services is running on UDP port 137?

A. HTTPS

B. HTTP

C. TELNET

D. NetBIOS

 


Suggested Answer: D

 

 

Question 19

Which of the following methods of authentication uses finger prints to identify users?

A. Biometrics

B. PKI

C. Kerberos

D. Mutual authentication

 


Suggested Answer: A

 

 

Question 20

Which of the following security models dictates that subjects can only access objects through applications?

A. Biba-Clark model

B. Bell-LaPadula

C. Biba model

D. Clark-Wilson

 


Suggested Answer: D

 

 

Question 21

model?
Each correct answer represents a complete solution. Choose two.

A. User’s group

B. Access rights and permissions

C. File and data ownership

D. Smart card

 


Suggested Answer: BC

 

 

Question 22

Which of the following actions might cause a privacy breach while surfing the Internet?

A. Clicking pop-up windows while visiting a Web site.

B. Conducting only secure transactions.

C. Deleting mails from unknown sources.

D. Ignoring banner ads on Web sites.

 


Suggested Answer: A

 

 

Question 23

Which of the following is used to repair missing or damaged system files that might prevent Windows from starting correctly?

A. Boot Repair

B. System Repair

C. Recovery Repair

D. Startup Repair

 


Suggested Answer: D

 

 

Question 24

Which of the following defines the communication link between a Web server and Web applications?

A. Firewall

B. IETF

C. CGI

D. PGP

 


Suggested Answer: C

 

 

Question 25

Which of the following is the rating for paper or wood fires?

A. Class B

B. Class A

C. Class D

D. Class C

 


Suggested Answer: B

 

 

Question 26

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

A. B-rated

B. A-rated

C. D-rated

D. C-rated

 


Suggested Answer: A

 

 

Question 27

Which of the following are examples of passive attacks?
Each correct answer represents a complete solution. Choose all that apply.

A. Shoulder surfing

B. Dumpster diving

C. Placing a backdoor

D. Eavesdropping

 


Suggested Answer: ABD

 

 

Question 28

volume disk configuration for fault tolerance. What is the minimum number of disk drives required for implementing RAID-5 volumes?

A. Thirty-two

B. Two

C. Three

D. One

 


Suggested Answer: C

 

 

Question 29

You work as a Network Administrator for Infonet Inc. The company's network is connected to the Internet. The network has a Web server that is accessible to
Internet users. For security, you want to keep the Web server separate from other servers on the network. Where will you place the Web server?

A. In a virtual private network (VPN)

B. With the authentication server

C. In a demilitarized zone (DMZ)

D. With the database server

 


Suggested Answer: C

 

 

Question 30

?

A. UDP port 1701

B. UDP port 161

C. TCP port 443

D. TCP port 110

 


Suggested Answer: A

 

 

Question 31

is true?

A. It is a UDP attack that involves spoofing and flooding.

B. It is an ICMP attack that involves spoofing and flooding.

C. It is a denial of service (DoS) attack that leaves TCP ports open.

D. It is an attack with IP fragments that cannot be reassembled.

 


Suggested Answer: B

 

 

Question 32

Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?

A. Type II

B. Type I

C. Type III

D. Type IV

 


Suggested Answer: B

 

 

Question 33

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

A. Fragmentation overlap attack

B. Evasion attack

C. Fragmentation overwrite attack

D. Insertion attack

 


Suggested Answer: D

 

 

Question 34

What does TACACS stand for?

A. Terminal Authorized Control Access Cyber System

B. Terminal Adapter Controlling Access Control System

C. Terminal Access Controller Access Control System

D. Transfer Access Controller Auto Control System

 


Suggested Answer: C

 

 

Question 35

Identify whether the given statement is true or false.
"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

A. False

B. True

 


Suggested Answer: B

 

 

Question 36

authentication is true?

A. A user provides his user name and password for authentication.

B. A user uses a smart card for authentication.

C. A sensor scans some physical characteristics of a user and sends that information to the authentication server.

D. A user is issued a device that is used for authentication.

 


Suggested Answer: C

 

 

Question 37

is true?

A. It is a computer that is used to resolve the NetBIOS name to an IP address.

B. It is a computer that is used to resolve the host name to an IP address.

C. It is a computer that is accessible from the Internet to collect information about internal networks.

D. It is a computer that must be made secure because it is accessible from the Internet and hence is more vulnerable to attacks.

 


Suggested Answer: D

 

 

Question 38

Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

A. Authentication

B. Sanitization

C. Hardening

D. Cryptography

 


Suggested Answer: C

 

 

Question 39

is true?

A. It is used to store information about confidential data.

B. It is used to send confidential data on the public network.

C. It allows or restricts the flow of encrypted packets to provide security.

D. It allows or restricts the flow of specific types of packets to provide security.

 


Suggested Answer: D

 

 

Question 40

Which of the following protocols is used to query and modify information stored within the directory services?

A. PPTP

B. ARP

C. PAP

D. LDAP

 


Suggested Answer: D

 

 

Question 41

Which of the following is used by attackers to obtain an authenticated connection on a network?

A. Back door

B. Replay attack

C. Denial-of-Service (DoS) attack

D. Man-in-the-middle attack

 


Suggested Answer: B

 

 

Question 42

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions
.EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.

A. File virus

B. Polymorphic virus

C. Stealth virus

D. Multipartite virus

E. Boot sector virus

 


Suggested Answer: A

 

 

Question 43

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are- secure network is vulnerable to a man-inthe- middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants. Which of the following cryptographic algorithms is being used by the Weare- secure server?

A. RSA

B. Diffie-Hellman

C. Twofish

D. Blowfish

 


Suggested Answer: B

 

 

Question 44

SIMULATION -
Fill in the blank with the appropriate value.
Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.

 


Suggested Answer: 32

 

 

Question 45

Which of the following are the common roles with regard to data in an information classification program?
Each correct answer represents a complete solution. Choose all that apply.

A. User

B. Owner

C. Custodian

D. Security auditor

E. Editor

 


Suggested Answer: ABCD

 

 

Question 46

Which of the following security models deal only with integrity?
Each correct answer represents a complete solution. Choose two.

A. Biba

B. Bell-LaPadula

C. Biba-Wilson

D. Clark-Wilson

 


Suggested Answer: AD

 

 

Question 47

service?
Each correct answer represents a complete solution. Choose two.

A. 443

B. 20

C. 21

D. 80

 


Suggested Answer: BC

 

 

Question 48

Which of the following types of coaxial cable is used for cable TV and cable modems?

A. RG-62

B. RG-59

C. RG-8

D. RG-58

 


Suggested Answer: B

 

 

Question 49

Which of the following is a term used to refer to access of a wireless Internet connection by bringing one's own computer within the range of another's wireless connection, and using that service without the subscriber's explicit permission or knowledge?

A. Mail bombing

B. Piggybacking

C. Spoofing

D. Snooping

 


Suggested Answer: B

 

 

Question 50

Identify whether the given statement is true or false.
"Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."

A. False

B. True

 


Suggested Answer: B

 

 

Access Full GISP Exam Prep Free

Want to go beyond these 50 questions? Click here to unlock a full set of GISP exam prep free questions covering every domain tested on the exam.

We continuously update our content to ensure you have the most current and effective prep materials.

Good luck with your GISP certification journey!

Share18Tweet11
Previous Post

DVA-C02 Exam Prep Free

Next Post

Google Associate Cloud Engineer Exam Prep Free

Next Post

Google Associate Cloud Engineer Exam Prep Free

Google Professional Cloud Architect Exam Prep Free

Google Professional Cloud Database Engineer Exam Prep Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.