Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Exam Prep Free

GISF Exam Prep Free

Table of Contents

Toggle
  • GISF Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day
  • Access Full GISF Exam Prep Free

GISF Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day

Getting ready for the GISF certification? Our GISF Exam Prep Free resource includes 50 exam-style questions designed to help you practice effectively and feel confident on test day

Effective GISF exam prep free is the key to success. With our free practice questions, you can:

  • Get familiar with exam format and question style
  • Identify which topics you’ve mastered—and which need more review
  • Boost your confidence and reduce exam anxiety

Below, you will find 50 realistic GISF Exam Prep Free questions that cover key exam topics. These questions are designed to reflect the structure and challenge level of the actual exam, making them perfect for your study routine.

Question 1

Mark works as a Customer Support Technician for uCertify Inc. The company provides troubleshooting support to users. Mark is troubleshooting a computer of a user who is working on Windows Vista. The user reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center should Mark configure to save the user's data?

A. Automatic updating

B. Firewall

C. Malware protection

D. Content Advisor

 


Suggested Answer: A

 

 

Question 2

Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?

A. Preparation phase

B. Eradication phase

C. Differential phase

D. Identification phase

 


Suggested Answer: D

 

 

Question 3

You are the Administrator for a corporate network. You are concerned about denial of service attacks. Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?

A. Shorten the timeout for connection attempts.

B. Place a honey pot in the DMZ.

C. Implement a strong password policy.

D. Implement network based antivirus.

 


Suggested Answer: A

 

 

Question 4

Which of the following network connectivity devices translates one protocol into another and is used to connect dissimilar network technologies?

A. Hub

B. Firewall

C. Bridge

D. Gateway

 


Suggested Answer: D

 

 

Question 5

Which of the following are the differences between routed protocols and routing protocols?
Each correct answer represents a complete solution. Choose two.

A. A routing protocol is configured on an interface and decides the method of packet delivery.

B. A routing protocol decides the path for a packet through the network.

C. A routed protocol is configured on an interface and decides how a packet will be delivered.

D. A routed protocol works on the transport layer of the OSI model.

 


Suggested Answer: BC

 

 

Question 6

Which of the following statements about Secure Shell (SSH) are true?
Each correct answer represents a complete solution. Choose three.

A. It was designed as a replacement for TELNET and other insecure shells.

B. It is a network protocol used primarily on Linux and Unix based systems.

C. It allows data to be exchanged using a secure channel between two networked devices.

D. It is the core routing protocol of the Internet.

 


Suggested Answer: ABC

 

 

Question 7

Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the data stored on a disk on a file-by-file basis?

A. Public key

B. Digital certificates

C. Twofish

D. RSA

 


Suggested Answer: AB

 

 

Question 8

Which of the following is NOT a phase of the OODA Loop strategy?

A. Observe

B. Define

C. Orient

D. Act

 


Suggested Answer: B

 

 

Question 9

Which of the following is the primary function of VPNs?

A. To establish private connections over public networks

B. To make virtual connections for remote access

C. To establish a wireless connections to networks

D. To access networks remotely

 


Suggested Answer: A

 

 

Question 10

Which of the following cryptographic algorithms uses a single key to encrypt and decrypt data?

A. Asymmetric

B. Symmetric

C. Numeric

D. Hashing

 


Suggested Answer: B

 

 

Question 11

Which of the following is used to determine whether or not a principal is allowed to perform a requested action?

A. Authentication

B. Security policy

C. Authorization

D. Principal

 


Suggested Answer: C

 

 

Question 12

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He analyzes that the company has blocked all ports except port 80.
Which of the following attacking methods can he use to send the dangerous software protocols?

A. HTTP tunneling

B. URL obfuscation

C. Banner grabbing

D. MAC spoofing

 


Suggested Answer: A

 

 

Question 13

Which of the following is a pillar of Information Assurance CIA triad?

A. Integrity

B. Affiliation

C. Accessibility

D. Isolation

 


Suggested Answer: A

 

 

Question 14

Which of the following is the best approach to conflict resolution?

A. Hard work and understanding

B. Mutual respect and cooperation

C. Flexibility

D. Sincerity and hard work

 


Suggested Answer: B

 

 

Question 15

Joseph works as a Software Developer for WebTech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?

A. Trademark laws

B. Patent laws

C. Copyright laws

D. Code Security law

 


Suggested Answer: B

 

 

Question 16

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

A. Bandwidth

B. Load

C. Delay

D. Frequency

 


Suggested Answer: D

 

 

Question 17

Which of the following refers to encrypted text?

A. Plaintext

B. Cookies

C. Ciphertext

D. Hypertext

 


Suggested Answer: C

 

 

Question 18

Which of the following categories of the network management model is used to detect and log network problems or device failures?

A. Fault Management

B. Configuration Management

C. Security Management

D. Performance Management

 


Suggested Answer: A

 

 

Question 19

Which of the following IDS/IPS detection methods do the URLs use to detect and prevent an attack?

A. Encryption-based detection

B. Policy-based detection

C. Signature-based detection

D. Internet bot detection

 


Suggested Answer: C

 

 

Question 20

Web applications play a vital role in deploying different databases with user accessibility on the Internet. Which of the following allows an attacker to get unauthorized access to the database of a Web application by sending (attacking) user-supplied data to an interpreter as part of a command or query?

A. Cross Site Scripting

B. Injection flaw

C. Cross Site Request Forgery (CSRF)

D. Malicious File Execution

 


Suggested Answer: B

 

 

Question 21

Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

A. Risk acceptance

B. Risk transfer

C. Risk avoidance

D. Risk mitigation

 


Suggested Answer: B

 

 

Question 22

Which of the following are the types of Intrusion detection system?

A. Server-based intrusion detection system (SIDS)

B. Client based intrusion detection system (CIDS)

C. Host-based intrusion detection system (HIDS)

D. Network intrusion detection system (NIDS)

 


Suggested Answer: CD

 

 

Question 23

In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

A. Bandwidth

B. Load

C. Delay

D. Frequency

 


Suggested Answer: D

 

 

Question 24

Which of the following statements are true about Dsniff?
Each correct answer represents a complete solution. Choose two.

A. It is a virus.

B. It contains Trojans.

C. It is antivirus.

D. It is a collection of various hacking tools.

 


Suggested Answer: BD

 

 

Question 25

Which of the following types of viruses can prevent itself from being detected by an antivirus application?

A. File virus

B. Boot sector virus

C. Multipartite virus

D. Stealth virus

 


Suggested Answer: D

 

 

Question 26

You are the project manager for a software technology company. You and the project team have identified that the executive staff is not fully committed to the project. Which of the following best describes the risk?

A. Residual risks

B. Trend analysis

C. Schedule control

D. Organizational risks

 


Suggested Answer: D

 

 

Question 27

You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?

A. Quantitative analysis

B. Qualitative analysis

C. Estimate activity duration

D. Risk identification

 


Suggested Answer: B

 

 

Question 28

The security of a computer against the unauthorized usage largely depends upon the efficiency of the applied access control method. Which of the following statements are true about a computer access control method?
Each correct answer represents a complete solution. Choose all that apply.

A. It can be based upon fingerprint or eye recognition.

B. It can be time-synchronous.

C. It provides security against the virus attacks.

D. It provides security against Eavesdropping.

E. It checks the authenticity of a person.

F. It is used to encrypt a message before transmitting it on a network.

 


Suggested Answer: ABE

 

 

Question 29

You are the Network Administrator for a company that frequently exchanges confidential emails without outside parties (clients, vendors, etc.). You want those emails to be encrypted, however, you want the least overhead/difficulty in the encryption process. Which of the following should you choose?

A. MD5

B. DES

C. Symmetric Encryption

D. Asymmetric Encryption

 


Suggested Answer: D

 

 

Question 30

Which of the following statements about Encapsulating Security Payload (ESP) are true?
Each correct answer represents a complete solution. Choose two.

A. It can also be nested with the Layer Two Tunneling Protocol (L2TP).

B. It is an IPSec protocol.

C. It is a text-based communication protocol.

D. It uses TCP port 22 as the default port and operates at the application layer.

 


Suggested Answer: AB

 

 

Question 31

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

A. Recovery

B. Contamination

C. Identification

D. Eradication

E. Preparation

 


Suggested Answer: ABD

 

 

Question 32

Which of the following combines the characteristics of a bridge and a router?

A. Firewall

B. Brouter

C. Switch

D. Hub

E. Repeater

 


Suggested Answer: B

 

 

Question 33

Which of the following are parts of applying professional knowledge? Each correct answer represents a complete solution. Choose all that apply.

A. Maintaining cordial relationship with project sponsors

B. Reporting your project management appearance

C. Staying up-to-date with project management practices

D. Staying up-to-date with latest industry trends and new technology

 


Suggested Answer: BCD

 

 

Question 34

Mark works as a Network Administrator for NetTech Inc. The network uses routers from multiple vendors. Mark wants to implement a routing protocol on the company's network that provides VLSM support, scalability and minimal overhead on the network. Which of the following protocols will Mark use to fulfill the requirements?

A. RIPv1

B. EIGRP

C. CDP

D. OSPF

 


Suggested Answer: D

 

 

Question 35

You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista.
He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data?

A. Malware protection

B. Automatic updating

C. Firewall

D. Other security settings

 


Suggested Answer: C

 

 

Question 36

Each time you start your computer, you receive an error message that your TCP/IP address is in use. Which of the following attacks is this?

A. Worm attack

B. ICMP attack

C. Back door attack

D. TCP/IP hijacking

E. TCP Sequence Number attack

F. TCP SYN or TCP ACK flood attack

 


Suggested Answer: D

 

 

Question 37

You work as an Application Developer for uCertify Inc. The company uses Visual Studio .NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?

A. Kerberos

B. HTTPS

C. RSA

D. IPSEC

 


Suggested Answer: B

 

 

Question 38

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical security devices can now be used for verification and historical analysis of the ATM robbery?

A. Biometric devices

B. Intrusion detection systems

C. Key card

D. CCTV Cameras

 


Suggested Answer: D –

 

 

Question 39

Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

A. Snort

B. Wireshark

C. NetWitness

D. Netresident

 


Suggested Answer: B

 

 

Question 40

Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data?

A. Symmetric

B. Numeric

C. Hashing

D. Asymmetric

 


Suggested Answer: D

 

 

Question 41

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network.
John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

A. Operational audit

B. Non-operational audit

C. Independent audit

D. Dependent audit

 


Suggested Answer: C

 

 

Question 42

Which of the following types of attack can guess a hashed password?

A. Teardrop attack

B. Evasion attack

C. Denial of Service attack

D. Brute force attack

 


Suggested Answer: D

 

 

Question 43

Which of the following statements is not true about a digital certificate?

A. It is used with both public key encryption and private key encryption.

B. It is used with private key encryption.

C. It is neither used with public key encryption nor with private key encryption.

D. It is used with public key encryption.

 


Suggested Answer: D

 

 

Question 44

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?

A. Smurf DoS attack

B. Teardrop attack

C. Fraggle DoS attack

D. Ping flood attack

 


Suggested Answer: C

 

 

Question 45

You work as a Network Administrator for Tech World Inc. The company has a TCP/IP-based router. You have configured a router on your network. You want to accomplish the following goals: l Configure the router to require a password to move from user EXEC mode to privileged EXEC mode. l The password must be listed as a hidden entry in the configuration file.
You run the following command: enable password
Which of the goals will this action accomplish?

A. The password will be listed as a hidden entry in the configuration file

B. The action will accomplish neither of the goals

C. The action will accomplish both the goals

D. The router will require a password to move from user EXEC mode to privileged EXEC mode

 


Suggested Answer: D

 

 

Question 46

Mark is implementing security on his e-commerce site. He wants to ensure that a customer sending a message is really the one he claims to be. Which of the following techniques will he use to ensure this?

A. Packet filtering

B. Authentication

C. Firewall

D. Digital signature

 


Suggested Answer: D

 

 

Question 47

Which of the following refers to the ability to ensure that the data is not modified or tampered with?

A. Availability

B. Integrity

C. Confidentiality

D. Non-repudiation

 


Suggested Answer: B

 

 

Question 48

Which of the following is the process of making additional copies of data so that they may be used to restore the original after a data loss event?

A. Data mining

B. Back-up

C. Data recovery

D. File storage

 


Suggested Answer: B

 

 

Question 49

Which of the following types of firewalls looks deep into packets and makes granular access control decisions?

A. Stateful

B. Application level proxy

C. Circuit level proxy

D. Packet filtering

 


Suggested Answer: B

 

 

Question 50

Which U.S. government agency is responsible for establishing standards concerning cryptography for nonmilitary use?

A. American Bankers Association

B. Central Security Service (CSS)

C. National Institute of Standards and Technology (NIST)

D. International Telecommunications Union

E. Request for Comments (RFC)

F. National Security Agency (NSA)

 


Suggested Answer: C

 

 

Access Full GISF Exam Prep Free

Want to go beyond these 50 questions? Click here to unlock a full set of GISF exam prep free questions covering every domain tested on the exam.

We continuously update our content to ensure you have the most current and effective prep materials.

Good luck with your GISF certification journey!

Share18Tweet11
Previous Post

DVA-C02 Exam Prep Free

Next Post

Google Associate Cloud Engineer Exam Prep Free

Next Post

Google Associate Cloud Engineer Exam Prep Free

Google Professional Cloud Architect Exam Prep Free

Google Professional Cloud Database Engineer Exam Prep Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.