GISF Mock Test Free – 50 Realistic Questions to Prepare with Confidence.
Getting ready for your GISF certification exam? Start your preparation the smart way with our GISF Mock Test Free – a carefully crafted set of 50 realistic, exam-style questions to help you practice effectively and boost your confidence.
Using a mock test free for GISF exam is one of the best ways to:
- Familiarize yourself with the actual exam format and question style
- Identify areas where you need more review
- Strengthen your time management and test-taking strategy
Below, you will find 50 free questions from our GISF Mock Test Free resource. These questions are structured to reflect the real exam’s difficulty and content areas, helping you assess your readiness accurately.
You have decided to implement an intrusion detection system on your network. You primarily are interested in the IDS being able to recognized known attack techniques. Which type of IDS should you choose?
A. Signature Based
B. Passive
C. Active
D. Anomaly Based
In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?
A. Bandwidth
B. Load
C. Delay
D. Frequency
Which of the following types of cipher encrypts alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword?
A. Block cipher
B. Transposition cipher
C. Vigen re cipher
D. Stream cipher
Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.
A. Sensitive
B. Unclassified
C. Confidential
D. Public
E. Secret
F. Private
You work as a Security manager for Qualoxizz Inc. Your company has number of network switches in the site network infrastructure. Which of the following actions will you perform to ensure the security of the switches in your company?
A. Set long session timeouts.
B. Open up all the unused management ports.
C. Set similar passwords for each management port.
D. Ignore usage of the default account settings.
Which of the following network connectivity devices translates one protocol into another and is used to connect dissimilar network technologies?
A. Hub
B. Firewall
C. Bridge
D. Gateway
Which of the following are the goals of the cryptographic systems? Each correct answer represents a complete solution. Choose three.
A. Availability
B. Authentication
C. Confidentiality
D. Integrity
You work as a Software Developer for uCertify Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?
A. Cryptographer
B. Cryptographic toolkit
C. Cryptosystem
D. Cryptanalyst
This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.
A. Multipartite virus
B. Boot sector virus
C. File virus
D. Stealth virus
E. Polymorphic virus
Hardening a system is one of the practical methods of securing a computer system. Which of the following techniques is used for hardening a computer system?
A. Disabling all user accounts
B. Applying egress filtering
C. Applying Access Control List (ACL)
D. Applying a patch to the OS kernel
Which of the following federal laws are related to hacking activities? Each correct answer represents a complete solution. Choose three.
A. 18 U.S.C. 1029
B. 18 U.S.C. 1028
C. 18 U.S.1030
D. 18 U.S.C. 2510
You are concerned about possible hackers doing penetration testing on your network as a prelude to an attack. What would be most helpful to you in finding out if this is occurring?
A. Examining your firewall logs
B. Examining your DNS Server logs
C. Examining your domain controller server logs
D. Examining your antivirus logs
John is a merchant. He has set up a LAN in his office. Some important files are deleted as a result of virus attack. John wants to ensure that it does not happen again. What will he use to protect his data from virus?
A. Antivirus
B. Backup
C. Symmetric encryption
D. Firewall
Bluetooth uses the _________ specification in the ________ band with FHSS technology.
A. IEEE 802.11, 2.4-2.5 GHz
B. IEEE 802.11, 1.4-2.5 GHz
C. IEEE 802.15, 1.5-2.0 GHz
D. IEEE 802.15, 2.4-2.5 GHz
Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?
A. The Configuration Manager
B. The Supplier Manager
C. The IT Service Continuity Manager
D. The Service Catalogue Manager
The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?
A. HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun
B. HKEY_CURRENT_USERSoftwareMicrosoftWABWAB4Wab File Name = “file and pathname of the WAB file”
C. HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun
D. HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRunServices
Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer?
A. IPLog
B. Snort
C. Timbersee
D. Swatch
You have an antivirus program for your network. It is dependent upon using lists of known viruses. What is this type of scan called?
A. Heuristic
B. Fixed List
C. Dictionary
D. Host Based
Cryptography is the science of?
A. Encrypting and decrypting plain text messages.
B. Decrypting encrypted text messages.
C. Encrypting plain text messages.
D. Hacking secure information.
Which of the following are some of the parts of a project plan? Each correct answer represents a complete solution. Choose all that apply.
A. Risk identification
B. Project schedule
C. Team members list
D. Risk analysis
Which of the following refers to encrypted text?
A. Plaintext
B. Cookies
C. Ciphertext
D. Hypertext
How long are cookies in effect if no expiration date is set?
A. Fifteen days
B. Until the session ends.
C. Forever
D. One year
You are the project manager for TTX project. You have to procure some electronics gadgets for the project. A relative of yours is in the retail business of those gadgets. He approaches you for your favor to get the order. This is the situation of ____.
A. Bribery
B. Irresponsible practice
C. Illegal practice
D. Conflict of interest
You are concerned about an attacker being able to get into your network. You want to make sure that you are informed of any network activity that is outside normal parameters. What is the best way to do this?
A. Utilize protocol analyzers.
B. User performance monitors.
C. Implement signature based antivirus.
D. Implement an anomaly based IDS.
Which of the following are the benefits of information classification for an organization?
A. It helps identify which information is the most sensitive or vital to an organization.
B. It ensures that modifications are not made to data by unauthorized personnel or processes
C. It helps identify which protections apply to which information.
D. It helps reduce the Total Cost of Ownership (TCO).
Which of the following protocols work at the Network layer of the OSI model?
A. Internet Group Management Protocol (IGMP)
B. Simple Network Management Protocol (SNMP)
C. Routing Information Protocol (RIP)
D. File Transfer Protocol (FTP)
Which of the following types of attack can guess a hashed password?
A. Teardrop attack
B. Evasion attack
C. Denial of Service attack
D. Brute force attack
Which of the following wireless security features provides the best wireless security mechanism?
A. WPA with 802.1X authentication
B. WPA with Pre Shared Key
C. WPA
D. WEP
The SALES folder has a file named XFILE.DOC that contains critical information about your company. This folder resides on an NTFS volume. The company's Senior Sales Manager asks you to provide security for that file. You make a backup of that file and keep it in a locked cupboard, and then you deny access on the file for the Sales group. John, a member of the Sales group, accidentally deletes that file. You have verified that John is not a member of any other group. Although you restore the file from backup, you are confused how John was able to delete the file despite having no access to that file. What is the most likely cause?
A. The Sales group has the Full Control permission on the SALES folder.
B. The Deny Access permission does not work on files.
C. The Deny Access permission does not restrict the deletion of files.
D. John is a member of another group having the Full Control permission on that file.
You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the following should you use?
A. SHA
B. AES
C. MD5
D. DES
You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. The messaging organization contains one Hub Transport server, one Client Access server, and two Mailbox servers. You are planning to deploy an Edge Transport server in your messaging organization to minimize the attack surface. At which of the following locations will you deploy the Edge Transport server?
A. Active Directory site
B. Intranet
C. Behind the inner firewall of an organization
D. Perimeter network
Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?
A. Trademark laws
B. Patent laws
C. Copyright laws
D. Code Security law
You are the project manager of a new project in your organization. You and the project team have identified the project risks, completed risk analysis, and are planning the most appropriate risk responses. Which of the following tools is most effective to choose the most appropriate risk response?
A. Project network diagrams
B. Delphi Technique
C. Decision tree analysis
D. Cause-and-effect diagrams
You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company's Website. Which of the following methods of investigation can you use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.
B. Look at the Web servers logs and normal traffic logging.
C. Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.
D. Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company’s site.
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
A. Corrective controls
B. Detective controls
C. Safeguards
D. Preventive controls
Which of the following statements about Public Key Infrastructure (PKI) is true?
A. It uses symmetric key pairs.
B. It uses public key encryption.
C. It is a digital representation of information that identifies users.
D. It provides security using data encryption and digital signature.
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
A. TCP FTP proxy scanning
B. Eavesdropping
C. Fingerprinting
D. Web ripping
Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?
A. Risk analysis
B. Firewall security
C. OODA loop
D. Cryptography
Which of the following is a pillar of Information Assurance CIA triad?
A. Integrity
B. Affiliation
C. Accessibility
D. Isolation
Which of the following is the purpose of employing DMZ (Demilitarized zone) in a network?
A. It adds an additional layer of security to a Local Area Network (LAN).
B. It creates a check-point to a Local Area Network (LAN).
C. It adds an extra node to the Local Area Network (LAN).
D. It works along with the firewall to filter unwanted data packets.
Which of the following is a valid IP address for class B Networks?
A. 172.157.88.3
B. 80.33.5.7
C. 212.136.45.8
D. 225.128.98.7
Tom works as the project manager for BlueWell Inc. He is working with his project to ensure timely and appropriate generation, retrieval, distribution, collection, storage, and ultimate disposition of project information. What is the process in which Tom is working?
A. Stakeholder expectation management
B. Stakeholder analysis
C. Work performance measurement
D. Project communication management
Which of the following tools are used to determine the hop counts of an IP packet? Each correct answer represents a complete solution. Choose two.
A. Netstat
B. Ping
C. TRACERT
D. IPCONFIG
Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host?
A. Blackbox testing
B. Firewalking
C. Brainstorming
D. Port redirection
You work as a Network Administrator for NetTech Inc. The company wants to encrypt its e-mails. Which of the following will you use to accomplish this?
A. NTFS
B. PPTP
C. PGP
D. IPSec
You work as a Software Developer for Mansoft Inc. You have participated in the customization of a previously developed Configuration Management Application Block (CMAB) that manages an application configuration setting in multiple data stores. Based on requirements, you have extended the CMAB to read and write configuration data to and from an Oracle database. You need to create a unit test strategy. Which of the following steps would you include in a unit test of the CMAB? Each correct answer represents a part of the solution. Choose all that apply.
A. Perform White box testing
B. Regression test the existing functionality
C. Execute Use cases of the application
D. Perform Stress testing
E. Review the implementation
Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information? Each correct answer represents a complete solution. Choose all that apply.
A. Slack space
B. Unused Sectors
C. Dumb space
D. Hidden partition
Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions, which is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed? Each correct answer represents a complete solution. Choose all that apply.
A. Attacker can exploit any protocol used to go into the internal network or intranet of the com pany.
B. Attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different.
C. Attacker can gain access to the Web server in a DMZ and exploit the database.
D. Attacker can perform Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network.
In which type of access control do user ID and password system come under?
A. Physical
B. Power
C. Technical
D. Administrative
Which of the following are the types of Intrusion detection system?
A. Server-based intrusion detection system (SIDS)
B. Client based intrusion detection system (CIDS)
C. Host-based intrusion detection system (HIDS)
D. Network intrusion detection system (NIDS)
Access Full GISF Mock Test Free
Want a full-length mock test experience? Click here to unlock the complete GISF Mock Test Free set and get access to hundreds of additional practice questions covering all key topics.
We regularly update our question sets to stay aligned with the latest exam objectives—so check back often for fresh content!
Start practicing with our GISF mock test free today—and take a major step toward exam success!