GISF Dump Free – 50 Practice Questions to Sharpen Your Exam Readiness.
Looking for a reliable way to prepare for your GISF certification? Our GISF Dump Free includes 50 exam-style practice questions designed to reflect real test scenarios—helping you study smarter and pass with confidence.
Using an GISF dump free set of questions can give you an edge in your exam prep by helping you:
- Understand the format and types of questions you’ll face
- Pinpoint weak areas and focus your study efforts
- Boost your confidence with realistic question practice
Below, you will find 50 free questions from our GISF Dump Free collection. These cover key topics and are structured to simulate the difficulty level of the real exam, making them a valuable tool for review or final prep.
Which of the following tools are used to determine the hop counts of an IP packet? Each correct answer represents a complete solution. Choose two.
A. Netstat
B. Ping
C. TRACERT
D. IPCONFIG
The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?
A. Biometric devices
B. Intrusion detection systems
C. Key card
D. CCTV Cameras
You work as an Application Developer for uCertify Inc. The company uses Visual Studio .NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?
A. Kerberos
B. HTTPS
C. RSA
D. IPSEC
Which of the following types of authentications supported by OSPF? Each correct answer represents a complete solution. Choose three.
A. MD5 authentication
B. Simple password authentication
C. Null authentication
D. Kerberos v5 authentication
Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions, which is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed? Each correct answer represents a complete solution. Choose all that apply.
A. Attacker can exploit any protocol used to go into the internal network or intranet of the com pany.
B. Attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different.
C. Attacker can gain access to the Web server in a DMZ and exploit the database.
D. Attacker can perform Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network.
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site. The We-are-secure login page is vulnerable to a __________.
A. Social engineering
B. Smurf DoS
C. Brute force
D. Ping flood attack
Which of the following types of firewalls forms a session flow table?
A. Proxy server firewall
B. Packet filtering firewall
C. Stateless packet filtering firewall
D. Stateful packet filtering firewall
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He enters a single quote in the input field of the login page of the Weare- secure Web site and receives the following error message: Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14' This error message shows that the We-are-secure Website is vulnerable to __________.
A. A buffer overflow
B. An XSS attack
C. A Denial-of-Service attack
D. A SQL injection attack
What are packet sniffers?
A. Packet sniffers encrypt the packages as they cross the network.
B. Packet sniffers test package security.
C. Packet sniffers test the packages to verify data integrity.
D. Packet sniffers capture the packages as they cross the network.
You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?
A. Containment
B. Identification
C. Preparation
D. Eradication
You are the project manager of SST project. You are in the process of collecting and distributing performance information including status report, progress measurements, and forecasts. Which of the following process are you performing?
A. Perform Quality Control
B. Verify Scope
C. Report Performance
D. Control Scope
Which of the following statements about digital signature is true?
A. Digital signature is required for an e-mail message to get through a firewall.
B. Digital signature verifies the identity of the person who applies it to a document.
C. Digital signature decrypts the contents of documents.
D. Digital signature compresses the message to which it is applied.
You work as a professional Computer Hacking Forensic Investigator for DataEnet Inc. You want to investigate e-mail information of an employee of the company. The suspected employee is using an online e-mail system such as Hotmail or Yahoo. Which of the following folders on the local computer will you review to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. Cookies folder
B. Temporary Internet Folder
C. Download folder
D. History folder
Which of the following types of firewall functions at the Session layer of OSI model?
A. Circuit-level firewall
B. Application-level firewall
C. Switch-level firewall
D. Packet filtering firewall
You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?
A. Denial-of-Service
B. Eavesdropping
C. Spoofing
D. Packet manipulation
Hardening a system is one of the practical methods of securing a computer system. Which of the following techniques is used for hardening a computer system?
A. Disabling all user accounts
B. Applying egress filtering
C. Applying Access Control List (ACL)
D. Applying a patch to the OS kernel
Which of the following statements about asymmetric encryption are true? Each correct answer represents a complete solution. Choose two.
A. Asymmetric encryption is faster as compared to symmetric encryption.
B. Asymmetric encryption uses a public key and a private key pair for data encryption.
C. In asymmetric encryption, only one key is needed to encrypt and decrypt data.
D. In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.
Which of the following logs contains events pertaining to security as defined in the Audit policy?
A. DNS server log
B. Application log
C. System log
D. Directory Service log
E. Security log
F. File Replication Service log
Which of the following categories of the network management model is used to detect and log network problems or device failures?
A. Fault Management
B. Configuration Management
C. Security Management
D. Performance Management
Your network utilizes a coax cable for connections between various network segments. Your predecessor made sure none of the coax cables were in an exposed area that could easily be accessed. This caused the use of significant extra cabling. Why do you think this was done?
A. This was an error you should correct. It wastes the cable and may make maintenance more difficult.
B. He was concerned about wireless interception of data.
C. He was concerned about electromagnetic emanation being used to gather data.
D. He was concerned about vampire taps.
Which of the following IDS/IPS detection methods do the URLs use to detect and prevent an attack?
A. Encryption-based detection
B. Policy-based detection
C. Signature-based detection
D. Internet bot detection
Which of the following are the types of Intrusion detection system?
A. Server-based intrusion detection system (SIDS)
B. Client based intrusion detection system (CIDS)
C. Host-based intrusion detection system (HIDS)
D. Network intrusion detection system (NIDS)
You work as a Software Developer for Mansoft Inc. You create an application. You want to use the application to encrypt data. You use the HashAlgorithmType enumeration to specify the algorithm used for generating Message Authentication Code (MAC) in Secure Sockets Layer (SSL) communications. Which of the following are valid values for HashAlgorithmType enumeration? Each correct answer represents a part of the solution. Choose all that apply.
A. MD5
B. None
C. DES
D. RSA
E. SHA1
F. 3DES
Which of the following protocols implements VPN using IPSec?
A. SLIP
B. PPTP
C. PPP
D. L2TP
Which of the following combines the characteristics of a bridge and a router?
A. Firewall
B. Brouter
C. Switch
D. Hub
E. Repeater
You have been tasked with finding an encryption methodology for your company's network. The solution must use public key encryption which is keyed to the users email address. Which of the following should you select?
A. AES
B. 3DES
C. PGP
D. Blowfish
Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following? 1. To account for all IT assets 2. To provide precise information support to other ITIL disciplines 3. To provide a solid base only for Incident and Problem Management 4. To verify configuration records and correct any exceptions
A. 2 and 4 only
B. 1, 3, and 4 only
C. 1, 2, and 4 only
D. 2, 3, and 4 only
At which OSI layer does UDP operate?
A. Network layer
B. Data-link layer
C. Session layer
D. Transport layer
E. Presentation layer
Sam is creating an e-commerce site. He wants a simple security solution that does not require each customer to have an individual key. Which of the following encryption methods will he use?
A. S/MIME
B. PGP
C. Asymmetric encryption
D. Symmetric encryption
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?
A. Web ripping
B. Email spoofing
C. Steganography
D. Social engineering
You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company's Website. Which of the following methods of investigation can you use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.
B. Look at the Web servers logs and normal traffic logging.
C. Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.
D. Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company’s site.
Firekiller 2000 is an example of a __________.
A. DoS attack Trojan
B. Data sending Trojan
C. Remote access Trojan
D. Security software disabler Trojan
You are the project manager of a new project in your organization. You and the project team have identified the project risks, completed risk analysis, and are planning the most appropriate risk responses. Which of the following tools is most effective to choose the most appropriate risk response?
A. Project network diagrams
B. Delphi Technique
C. Decision tree analysis
D. Cause-and-effect diagrams
You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?
A. By examining your firewall logs.
B. By examining your domain controller server logs.
C. By setting up a DMZ.
D. You cannot, you need an IDS.
Tom works as the project manager for BlueWell Inc. He is working with his project to ensure timely and appropriate generation, retrieval, distribution, collection, storage, and ultimate disposition of project information. What is the process in which Tom is working?
A. Stakeholder expectation management
B. Stakeholder analysis
C. Work performance measurement
D. Project communication management
Which of the following is the most secure place to host a server that will be accessed publicly through the Internet?
A. A DNS Zone
B. An Intranet
C. A demilitarized zone (DMZ)
D. A stub zone
Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?
A. The Configuration Manager
B. The Supplier Manager
C. The IT Service Continuity Manager
D. The Service Catalogue Manager
You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon attempts allowed before a user account is locked out. What will you do to accomplish the task?
A. Reset Account Lockout Counter After policy
B. Set Account Lockout Threshold policy
C. Enforce Password Must Meet Complexity Requirements policy
D. Set Account Lockout Duration policy
Which of the following statements are true about routers? Each correct answer represents a complete solution. Choose all that apply.
A. Routers do not limit physical broadcast traffic.
B. Routers act as protocol translators and bind dissimilar networks.
C. Routers organize addresses into classes, which are used to determine how to move packets from one network to another.
D. Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follow.
You work as a security manager in Mariotiss Inc. Your enterprise has been facing network and software security threats since a few months. You want to renew your current security policies and management to enhance the safety of your information systems. Which of the following is the best practice to initiate the renewal process from the lowest level with the least managerial effort?
A. Start the Incident handling process.
B. Change the entire security policy.
C. Perform an IT audit.
D. Switch to a new network infrastructure.
The SALES folder has a file named XFILE.DOC that contains critical information about your company. This folder resides on an NTFS volume. The company's Senior Sales Manager asks you to provide security for that file. You make a backup of that file and keep it in a locked cupboard, and then you deny access on the file for the Sales group. John, a member of the Sales group, accidentally deletes that file. You have verified that John is not a member of any other group. Although you restore the file from backup, you are confused how John was able to delete the file despite having no access to that file. What is the most likely cause?
A. The Sales group has the Full Control permission on the SALES folder.
B. The Deny Access permission does not work on files.
C. The Deny Access permission does not restrict the deletion of files.
D. John is a member of another group having the Full Control permission on that file.
You work as a Network Administrator for Net World Inc. The company has a TCP/IP-based network. You have configured an Internet access router on the network. A user complains that he is unable to access a resource on the Web. You know that a bad NAT table entry is causing the issue. You decide to clear all the entries on the table. Which of the following commands will you use?
A. show ip dhcp binding
B. ipconfig /flushdns
C. ipconfig /all
D. clear ip nat translation *
John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. Samhain
B. SARA
C. Snort
D. Tripwire
Which of the following protocols is used to prevent switching loops in networks with redundant switched paths?
A. Cisco Discovery Protocol (CDP)
B. Spanning Tree Protocol (STP)
C. File Transfer Protocol (FTP)
D. VLAN Trunking Protocol (VTP)
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?
A. NTFS
B. PPTP
C. PGP
D. IPSec
Which of the following protocols are used by Network Attached Storage (NAS)? Each correct answer represents a complete solution. Choose all that apply.
A. Apple Filing Protocol (AFP)
B. Server Message Block (SMB)
C. Network File System (NFS)
D. Distributed file system (Dfs)
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you want to apply Windows firewall setting to all the computers in the domain to improve security. Which of the following is the fastest and the most effective way to accomplish the task?
A. Apply firewall settings manually.
B. Apply firewall settings on the domain controller of the domain.
C. Use group policy to apply firewall settings.
D. Use a batch file to apply firewall setting.
You want to ensure that everyone who sends you an email should encrypt it. However you do not wish to exchange individual keys with all people who send you emails. In order to accomplish this goal which of the following should you choose?
A. DES
B. AES
C. Symmetric Encryption
D. Public Key encryption
Which of the following types of viruses can prevent itself from being detected by an antivirus application?
A. File virus
B. Boot sector virus
C. Multipartite virus
D. Stealth virus
Which of the following are the differences between routed protocols and routing protocols? Each correct answer represents a complete solution. Choose two.
A. A routing protocol is configured on an interface and decides the method of packet delivery.
B. A routing protocol decides the path for a packet through the network.
C. A routed protocol is configured on an interface and decides how a packet will be delivered.
D. A routed protocol works on the transport layer of the OSI model.
Access Full GISF Dump Free
Looking for even more practice questions? Click here to access the complete GISF Dump Free collection, offering hundreds of questions across all exam objectives.
We regularly update our content to ensure accuracy and relevance—so be sure to check back for new material.
Begin your certification journey today with our GISF dump free questions — and get one step closer to exam success!