GISF Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
Are you preparing for the GISF certification exam? Kickstart your success with our GISF Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.
Practicing with GISF practice questions free gives you a powerful edge by allowing you to:
- Understand the exam structure and question formats
- Discover your strong and weak areas
- Build the confidence you need for test day success
Below, you will find 50 free GISF practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.
You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?
A. Antivirus log
B. System log
C. IDS log
D. Firewall log
SIMULATION - Fill in the blank with the appropriate value. SHA-1 produces a ______-bit message digest.
You work as an Application Developer for uCertify Inc. The company uses Visual Studio .NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?
A. Kerberos
B. HTTPS
C. RSA
D. IPSEC
Jane works as a Consumer Support Technician for McRoberts Inc. The company provides troubleshooting support to users. A user named Peter installs Windows Vista on his computer. He connects his computer on the network. He wants to protect his computer from malicious software and prevent hackers from gaining access to his computer through the network. Which of the following actions will Jane assist Peter to perform to accomplish the task?
A. Don’t stay logged on as an administrator.
B. Use a firewall.
C. Keep the computer up-to-date.
D. Run antivirus software on the computer.
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
A. The presentation layer
B. The application layer
C. The transport layer
D. The session layer
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you want to apply Windows firewall setting to all the computers in the domain to improve security. Which of the following is the fastest and the most effective way to accomplish the task?
A. Apply firewall settings manually.
B. Apply firewall settings on the domain controller of the domain.
C. Use group policy to apply firewall settings.
D. Use a batch file to apply firewall setting.
You discover that someone has been logging onto your network after office hours. After investigating this you find the login belongs to someone who left the company 12 months ago. What would have been the best method to prevent this?
A. A policy with time of day restrictions.
B. An IDS system.
C. A policy with account expiration.
D. A DMZ firewall.
Which of the following firewalls operates at three layers- Layer3, Layer4, and Layer5?
A. Circuit-level firewall
B. Application layer firewall
C. Proxy firewall
D. Dynamic packet-filtering firewall
The Project Risk Management knowledge area focuses on which of the following processes? Each correct answer represents a complete solution. Choose all that apply.
A. Risk Management Planning
B. Quantitative Risk Analysis
C. Potential Risk Monitoring
D. Risk Monitoring and Control
You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista. He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data?
A. Malware protection
B. Automatic updating
C. Firewall
D. Other security settings
John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He analyzes that the company has blocked all ports except port 80. Which of the following attacking methods can he use to send the dangerous software protocols?
A. HTTP tunneling
B. URL obfuscation
C. Banner grabbing
D. MAC spoofing
Which of the following is the best approach to conflict resolution?
A. Hard work and understanding
B. Mutual respect and cooperation
C. Flexibility
D. Sincerity and hard work
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?
A. Operational audit
B. Non-operational audit
C. Independent audit
D. Dependent audit
Which of the following protocols work at the Network layer of the OSI model?
A. Internet Group Management Protocol (IGMP)
B. Simple Network Management Protocol (SNMP)
C. Routing Information Protocol (RIP)
D. File Transfer Protocol (FTP)
Which of the following are parts of applying professional knowledge? Each correct answer represents a complete solution. Choose all that apply.
A. Maintaining cordial relationship with project sponsors
B. Reporting your project management appearance
C. Staying up-to-date with project management practices
D. Staying up-to-date with latest industry trends and new technology
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?
A. TCP FTP proxy scanning
B. Eavesdropping
C. Fingerprinting
D. Web ripping
Which of the following refers to a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens?
A. Man-trap
B. Man-in-the-middle
C. Demilitarized zone (DMZ)
D. Firewall
Which of the following are the types of Intrusion detection system?
A. Server-based intrusion detection system (SIDS)
B. Client based intrusion detection system (CIDS)
C. Host-based intrusion detection system (HIDS)
D. Network intrusion detection system (NIDS)
Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?
A. PING attack
B. Spoofing
C. Hacking
D. SYN attack
Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration. The tool uses raw IP packets to determine the following: What ports are open on our network systems. What hosts are available on the network. Identify unauthorized wireless access points. What services (application name and version) those hosts are offering. What operating systems (and OS versions) they are running. What type of packet filters/firewalls are in use. Which of the following tools is Victor using?
A. Nessus
B. Kismet
C. Nmap
D. Sniffer
Which of the following protocols are used by Network Attached Storage (NAS)? Each correct answer represents a complete solution. Choose all that apply.
A. Apple Filing Protocol (AFP)
B. Server Message Block (SMB)
C. Network File System (NFS)
D. Distributed file system (Dfs)
You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. The messaging organization contains one Hub Transport server, one Client Access server, and two Mailbox servers. You are planning to deploy an Edge Transport server in your messaging organization to minimize the attack surface. At which of the following locations will you deploy the Edge Transport server?
A. Active Directory site
B. Intranet
C. Behind the inner firewall of an organization
D. Perimeter network
Availability Management allows organizations to sustain the IT service availability to support the business at a justifiable cost. Which of the following elements of Availability Management is used to perform at an agreed level over a period of time? Each correct answer represents a part of the solution. Choose all that apply.
A. Maintainability
B. Resilience
C. Error control
D. Recoverability
E. Reliability
F. Security
G. Serviceability
Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?
A. Firewall
B. Automatic Updating
C. Other Security Settings
D. Malware Protection
Which of the following types of cipher encrypts alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword?
A. Block cipher
B. Transposition cipher
C. Vigen re cipher
D. Stream cipher
Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.
A. Data encrypted with the secret key can only be decrypted by another secret key.
B. The secret key can encrypt a message, and anyone with the public key can decrypt it.
C. Data encrypted by the public key can only be decrypted by the secret key.
D. The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.
You work as a security manager for Qualxiss Inc. Your Company involves OODA loop for resolving and deciding over company issues. You have detected a security breach issue in your company. Which of the following procedures regarding the breach is involved in the observe phase of the OODA loop?
A. Follow the company security guidelines.
B. Decide an activity based on a hypothesis.
C. Implement an action practically as policies.
D. Consider previous experiences of security breaches.
Which of the following are used as primary technologies to create a layered defense for giving protection to a network? Each correct answer represents a complete solution. Choose all that apply.
A. Vulnerability
B. Firewall
C. Endpoint authentication
D. IDS
Which of the following objects in an Active Directory serve as security principles? Each correct answer represents a part of the solution. Choose all that apply.
A. User accounts
B. Organizational units (OUs)
C. Computer accounts
D. Groups
Which of the following is the process of making additional copies of data so that they may be used to restore the original after a data loss event?
A. Data mining
B. Back-up
C. Data recovery
D. File storage
Which of the following statements are true about classless routing protocols? Each correct answer represents a complete solution. Choose two.
A. They extend the IP addressing scheme.
B. The same subnet mask is used everywhere on the network.
C. They support VLSM and discontiguous networks.
D. IGRP is a classless routing protocol.
What does Wireless Transport Layer Security (WTLS) provide for wireless devices? Each correct answer represents a complete solution. Choose all that apply.
A. Data integrity
B. Authentication
C. Encryption
D. Bandwidth
Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?
A. Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer
B. Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer
C. application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer
D. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer
You switch on your mobile Bluetooth device to transfer data to another Bluetooth device. Which of the following Information assurance pillars ensures that the data transfer is being performed with the targeted authorized Bluetooth device and not with any other or unauthorized device?
A. Data integrity
B. Confidentiality
C. Authentication
D. Non-repudiation
Which of the following types of firewall functions at the Session layer of OSI model?
A. Circuit-level firewall
B. Application-level firewall
C. Switch-level firewall
D. Packet filtering firewall
Which of the following are the goals of the cryptographic systems? Each correct answer represents a complete solution. Choose three.
A. Availability
B. Authentication
C. Confidentiality
D. Integrity
Which of the following protocols provides secured transaction of data between two computers?
A. SSH
B. FTP
C. Telnet
D. RSH
Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following? 1. To account for all IT assets 2. To provide precise information support to other ITIL disciplines 3. To provide a solid base only for Incident and Problem Management 4. To verify configuration records and correct any exceptions
A. 2 and 4 only
B. 1, 3, and 4 only
C. 1, 2, and 4 only
D. 2, 3, and 4 only
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He enters a single quote in the input field of the login page of the Weare- secure Web site and receives the following error message: Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14' This error message shows that the We-are-secure Website is vulnerable to __________.
A. A buffer overflow
B. An XSS attack
C. A Denial-of-Service attack
D. A SQL injection attack
Which of the following factors determine the strength of the encryption?
A. Character-set encoding
B. Length of the key
C. Operating system
D. Ease of use
Which of the following are the levels of public or commercial data classification system? Each correct answer represents a complete solution. Choose all that apply.
A. Sensitive
B. Unclassified
C. Confidential
D. Public
E. Secret
F. Private
You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client computer on the company's network to Windows Vista Ultimate. During installation, the computer stops responding, and the screen does not change. What is the most likely cause?
A. Teardrop attack
B. Replay attack
C. Denial-of-Service (DoS) attack
D. Polymorphic shell code attack
You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?
A. Quantitative risk analysis
B. Risk audits
C. Qualitative risk analysis
D. Requested changes
A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?
A. IPChains
B. OpenSSH
C. Stunnel
D. IPTables
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?
A. Configure Network address translation (NAT).
B. Disable Windows firewall logging.
C. Configure Internet Protocol Security (IPSec).
D. Enable Windows firewall logging.
You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.
A. Recovery
B. Contamination
C. Identification
D. Eradication
E. Preparation
You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company's Website. Which of the following methods of investigation can you use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.
B. Look at the Web servers logs and normal traffic logging.
C. Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.
D. Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company’s site.
You want to ensure that everyone who sends you an email should encrypt it. However you do not wish to exchange individual keys with all people who send you emails. In order to accomplish this goal which of the following should you choose?
A. DES
B. AES
C. Symmetric Encryption
D. Public Key encryption
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.
A. Dictionary attack
B. Rule based attack
C. Brute Force attack
D. Hybrid attack
Tom works as the project manager for BlueWell Inc. He is working with his project to ensure timely and appropriate generation, retrieval, distribution, collection, storage, and ultimate disposition of project information. What is the process in which Tom is working?
A. Stakeholder expectation management
B. Stakeholder analysis
C. Work performance measurement
D. Project communication management
Free Access Full GISF Practice Questions Free
Want more hands-on practice? Click here to access the full bank of GISF practice questions free and reinforce your understanding of all exam objectives.
We update our question sets regularly, so check back often for new and relevant content.
Good luck with your GISF certification journey!