Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Questions Free

GISF Practice Questions Free

Table of Contents

Toggle
  • GISF Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
  • Free Access Full GISF Practice Questions Free

GISF Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills

Are you preparing for the GISF certification exam? Kickstart your success with our GISF Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.

Practicing with GISF practice questions free gives you a powerful edge by allowing you to:

  • Understand the exam structure and question formats
  • Discover your strong and weak areas
  • Build the confidence you need for test day success

Below, you will find 50 free GISF practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.

Question 1

You are the Network Administrator for a software development company. Your company creates various utilities and tools. You have noticed that some of the files your company creates are getting deleted from systems. When one is deleted, it seems to be deleted from all the computers on your network. Where would you first look to try and diagnose this problem?

A. Antivirus log

B. System log

C. IDS log

D. Firewall log

 


Suggested Answer: A

 

 

Question 2

SIMULATION -
Fill in the blank with the appropriate value. SHA-1 produces a ______-bit message digest.

 


Suggested Answer: SHA-1 produces a 160 -bit message digest

 

 

Question 3

You work as an Application Developer for uCertify Inc. The company uses Visual Studio .NET Framework 3.5 as its application development platform. You are working on a WCF service. You have decided to implement transport level security. Which of the following security protocols will you use?

A. Kerberos

B. HTTPS

C. RSA

D. IPSEC

 


Suggested Answer: B

 

 

Question 4

Jane works as a Consumer Support Technician for McRoberts Inc. The company provides troubleshooting support to users. A user named Peter installs Windows Vista on his computer. He connects his computer on the network. He wants to protect his computer from malicious software and prevent hackers from gaining access to his computer through the network. Which of the following actions will Jane assist Peter to perform to accomplish the task?

A. Don’t stay logged on as an administrator.

B. Use a firewall.

C. Keep the computer up-to-date.

D. Run antivirus software on the computer.

 


Suggested Answer: B

 

 

Question 5

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?

A. The presentation layer

B. The application layer

C. The transport layer

D. The session layer

 


Suggested Answer: C

 

 

Question 6

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you want to apply Windows firewall setting to all the computers in the domain to improve security.
Which of the following is the fastest and the most effective way to accomplish the task?

A. Apply firewall settings manually.

B. Apply firewall settings on the domain controller of the domain.

C. Use group policy to apply firewall settings.

D. Use a batch file to apply firewall setting.

 


Suggested Answer: C

 

 

Question 7

You discover that someone has been logging onto your network after office hours. After investigating this you find the login belongs to someone who left the company 12 months ago. What would have been the best method to prevent this?

A. A policy with time of day restrictions.

B. An IDS system.

C. A policy with account expiration.

D. A DMZ firewall.

 


Suggested Answer: C

 

 

Question 8

Which of the following firewalls operates at three layers- Layer3, Layer4, and Layer5?

A. Circuit-level firewall

B. Application layer firewall

C. Proxy firewall

D. Dynamic packet-filtering firewall

 


Suggested Answer: D

 

 

Question 9

The Project Risk Management knowledge area focuses on which of the following processes?
Each correct answer represents a complete solution. Choose all that apply.

A. Risk Management Planning

B. Quantitative Risk Analysis

C. Potential Risk Monitoring

D. Risk Monitoring and Control

 


Suggested Answer: ABD

 

 

Question 10

You work as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. You are troubleshooting a computer of a user who is working on Windows Vista.
He reports that his sensitive data is being accessed by someone because of security vulnerability in the component of Windows Vista. Which of the following features of Windows Security Center will you configure to save the user's data?

A. Malware protection

B. Automatic updating

C. Firewall

D. Other security settings

 


Suggested Answer: C

 

 

Question 11

John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He analyzes that the company has blocked all ports except port 80.
Which of the following attacking methods can he use to send the dangerous software protocols?

A. HTTP tunneling

B. URL obfuscation

C. Banner grabbing

D. MAC spoofing

 


Suggested Answer: A

 

 

Question 12

Which of the following is the best approach to conflict resolution?

A. Hard work and understanding

B. Mutual respect and cooperation

C. Flexibility

D. Sincerity and hard work

 


Suggested Answer: B

 

 

Question 13

You work as a Network Administrator for ABC Inc. The company uses a secure wireless network.
John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?

A. Operational audit

B. Non-operational audit

C. Independent audit

D. Dependent audit

 


Suggested Answer: C

 

 

Question 14

Which of the following protocols work at the Network layer of the OSI model?

A. Internet Group Management Protocol (IGMP)

B. Simple Network Management Protocol (SNMP)

C. Routing Information Protocol (RIP)

D. File Transfer Protocol (FTP)

 


Suggested Answer: AC

 

 

Question 15

Which of the following are parts of applying professional knowledge? Each correct answer represents a complete solution. Choose all that apply.

A. Maintaining cordial relationship with project sponsors

B. Reporting your project management appearance

C. Staying up-to-date with project management practices

D. Staying up-to-date with latest industry trends and new technology

 


Suggested Answer: BCD

 

 

Question 16

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He copies the whole structure of the We-are-secure Web site to the local disk and obtains all the files on the Web site. Which of the following techniques is he using to accomplish his task?

A. TCP FTP proxy scanning

B. Eavesdropping

C. Fingerprinting

D. Web ripping

 


Suggested Answer: D

 

 

Question 17

Which of the following refers to a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens?

A. Man-trap

B. Man-in-the-middle

C. Demilitarized zone (DMZ)

D. Firewall

 


Suggested Answer: A

 

 

Question 18

Which of the following are the types of Intrusion detection system?

A. Server-based intrusion detection system (SIDS)

B. Client based intrusion detection system (CIDS)

C. Host-based intrusion detection system (HIDS)

D. Network intrusion detection system (NIDS)

 


Suggested Answer: CD

 

 

Question 19

Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?

A. PING attack

B. Spoofing

C. Hacking

D. SYN attack

 


Suggested Answer: D

 

 

Question 20

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.
The tool uses raw IP packets to determine the following:
What ports are open on our network systems.
What hosts are available on the network.
Identify unauthorized wireless access points.
What services (application name and version) those hosts are offering.
What operating systems (and OS versions) they are running.
What type of packet filters/firewalls are in use.
Which of the following tools is Victor using?

A. Nessus

B. Kismet

C. Nmap

D. Sniffer

 


Suggested Answer: C

 

 

Question 21

Which of the following protocols are used by Network Attached Storage (NAS)?
Each correct answer represents a complete solution. Choose all that apply.

A. Apple Filing Protocol (AFP)

B. Server Message Block (SMB)

C. Network File System (NFS)

D. Distributed file system (Dfs)

 


Suggested Answer: ABC

 

 

Question 22

You work as an Exchange Administrator for TechWorld Inc. The company has a Windows 2008 Active Directory-based network. The network contains an Exchange Server 2010 organization. The messaging organization contains one Hub Transport server, one Client Access server, and two Mailbox servers.
You are planning to deploy an Edge Transport server in your messaging organization to minimize the attack surface. At which of the following locations will you deploy the Edge Transport server?

A. Active Directory site

B. Intranet

C. Behind the inner firewall of an organization

D. Perimeter network

 


Suggested Answer: D

 

 

Question 23

Availability Management allows organizations to sustain the IT service availability to support the business at a justifiable cost. Which of the following elements of Availability Management is used to perform at an agreed level over a period of time?
Each correct answer represents a part of the solution. Choose all that apply.

A. Maintainability

B. Resilience

C. Error control

D. Recoverability

E. Reliability

F. Security

G. Serviceability

 


Suggested Answer: ABDEFG

 

 

Question 24

Which of the following Windows Security Center features is implemented to give a logical layer protection between computers in a networked environment?

A. Firewall

B. Automatic Updating

C. Other Security Settings

D. Malware Protection

 


Suggested Answer: A

 

 

Question 25

Which of the following types of cipher encrypts alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword?

A. Block cipher

B. Transposition cipher

C. Vigen re cipher

D. Stream cipher

 


Suggested Answer: C

 

 

Question 26

Which of the following statements are true about Public-key cryptography? Each correct answer represents a complete solution. Choose two.

A. Data encrypted with the secret key can only be decrypted by another secret key.

B. The secret key can encrypt a message, and anyone with the public key can decrypt it.

C. Data encrypted by the public key can only be decrypted by the secret key.

D. The distinguishing technique used in public key-private key cryptography is the use of symmetric key algorithms.

 


Suggested Answer: BC

 

 

Question 27

You work as a security manager for Qualxiss Inc. Your Company involves OODA loop for resolving and deciding over company issues. You have detected a security breach issue in your company.
Which of the following procedures regarding the breach is involved in the observe phase of the OODA loop?

A. Follow the company security guidelines.

B. Decide an activity based on a hypothesis.

C. Implement an action practically as policies.

D. Consider previous experiences of security breaches.

 


Suggested Answer: A

 

 

Question 28

Which of the following are used as primary technologies to create a layered defense for giving protection to a network?
Each correct answer represents a complete solution. Choose all that apply.

A. Vulnerability

B. Firewall

C. Endpoint authentication

D. IDS

 


Suggested Answer: BCD

 

 

Question 29

Which of the following objects in an Active Directory serve as security principles?
Each correct answer represents a part of the solution. Choose all that apply.

A. User accounts

B. Organizational units (OUs)

C. Computer accounts

D. Groups

 


Suggested Answer: ACD

 

 

Question 30

Which of the following is the process of making additional copies of data so that they may be used to restore the original after a data loss event?

A. Data mining

B. Back-up

C. Data recovery

D. File storage

 


Suggested Answer: B

 

 

Question 31

Which of the following statements are true about classless routing protocols?
Each correct answer represents a complete solution. Choose two.

A. They extend the IP addressing scheme.

B. The same subnet mask is used everywhere on the network.

C. They support VLSM and discontiguous networks.

D. IGRP is a classless routing protocol.

 


Suggested Answer: AC

 

 

Question 32

What does Wireless Transport Layer Security (WTLS) provide for wireless devices?
Each correct answer represents a complete solution. Choose all that apply.

A. Data integrity

B. Authentication

C. Encryption

D. Bandwidth

 


Suggested Answer: ABC

 

 

Question 33

Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

A. Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

B. Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer

C. application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer

D. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer

 


Suggested Answer: D

 

 

Question 34

You switch on your mobile Bluetooth device to transfer data to another Bluetooth device. Which of the following Information assurance pillars ensures that the data transfer is being performed with the targeted authorized Bluetooth device and not with any other or unauthorized device?

A. Data integrity

B. Confidentiality

C. Authentication

D. Non-repudiation

 


Suggested Answer: C

 

 

Question 35

Which of the following types of firewall functions at the Session layer of OSI model?

A. Circuit-level firewall

B. Application-level firewall

C. Switch-level firewall

D. Packet filtering firewall

 


Suggested Answer: A

 

 

Question 36

Which of the following are the goals of the cryptographic systems?
Each correct answer represents a complete solution. Choose three.

A. Availability

B. Authentication

C. Confidentiality

D. Integrity

 


Suggested Answer: BCD

 

 

Question 37

Which of the following protocols provides secured transaction of data between two computers?

A. SSH

B. FTP

C. Telnet

D. RSH

 


Suggested Answer: A

 

 

Question 38

Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?
1. To account for all IT assets
2. To provide precise information support to other ITIL disciplines
3. To provide a solid base only for Incident and Problem Management
4. To verify configuration records and correct any exceptions

A. 2 and 4 only

B. 1, 3, and 4 only

C. 1, 2, and 4 only

D. 2, 3, and 4 only

 


Suggested Answer: C

 

 

Question 39

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.we-are-secure.com. He enters a single quote in the input field of the login page of the Weare- secure Web site and receives the following error message:
Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'
This error message shows that the We-are-secure Website is vulnerable to __________.

A. A buffer overflow

B. An XSS attack

C. A Denial-of-Service attack

D. A SQL injection attack

 


Suggested Answer: D

 

 

Question 40

Which of the following factors determine the strength of the encryption?

A. Character-set encoding

B. Length of the key

C. Operating system

D. Ease of use

 


Suggested Answer: B

 

 

Question 41

Which of the following are the levels of public or commercial data classification system?
Each correct answer represents a complete solution. Choose all that apply.

A. Sensitive

B. Unclassified

C. Confidential

D. Public

E. Secret

F. Private

 


Suggested Answer: ACDF

 

 

Question 42

You work as a Network Administrator for McRoberts Inc. You are required to upgrade a client computer on the company's network to Windows Vista Ultimate. During installation, the computer stops responding, and the screen does not change. What is the most likely cause?

A. Teardrop attack

B. Replay attack

C. Denial-of-Service (DoS) attack

D. Polymorphic shell code attack

 


Suggested Answer: C

 

 

Question 43

You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?

A. Quantitative risk analysis

B. Risk audits

C. Qualitative risk analysis

D. Requested changes

 


Suggested Answer: D

 

 

Question 44

A firewall is a combination of hardware and software, used to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?

A. IPChains

B. OpenSSH

C. Stunnel

D. IPTables

 


Suggested Answer: D

 

 

Question 45

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?

A. Configure Network address translation (NAT).

B. Disable Windows firewall logging.

C. Configure Internet Protocol Security (IPSec).

D. Enable Windows firewall logging.

 


Suggested Answer: D

 

 

Question 46

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution? Each correct answer represents a part of the solution. Choose all that apply.

A. Recovery

B. Contamination

C. Identification

D. Eradication

E. Preparation

 


Suggested Answer: ABD

 

 

Question 47

You work as a Computer Hacking Forensic Investigator for SecureNet Inc. You want to investigate Cross-Site Scripting attack on your company's Website. Which of the following methods of investigation can you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

A. Use a Web proxy to view the Web server transactions in real time and investigate any communication with outside servers.

B. Look at the Web servers logs and normal traffic logging.

C. Use Wireshark to capture traffic going to the server and then searching for the requests going to the input page, which may give log of the malicious traffic and the IP address of the source.

D. Review the source of any HTML-formatted e-mail messages for embedded scripts or links in the URL to the company’s site.

 


Suggested Answer: ABD

 

 

Question 48

You want to ensure that everyone who sends you an email should encrypt it. However you do not wish to exchange individual keys with all people who send you emails. In order to accomplish this goal which of the following should you choose?

A. DES

B. AES

C. Symmetric Encryption

D. Public Key encryption

 


Suggested Answer: D

 

 

Question 49

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.

A. Dictionary attack

B. Rule based attack

C. Brute Force attack

D. Hybrid attack

 


Suggested Answer: ACD

 

 

Question 50

Tom works as the project manager for BlueWell Inc. He is working with his project to ensure timely and appropriate generation, retrieval, distribution, collection, storage, and ultimate disposition of project information. What is the process in which Tom is working?

A. Stakeholder expectation management

B. Stakeholder analysis

C. Work performance measurement

D. Project communication management

 


Suggested Answer: D

 

 

Free Access Full GISF Practice Questions Free

Want more hands-on practice? Click here to access the full bank of GISF practice questions free and reinforce your understanding of all exam objectives.

We update our question sets regularly, so check back often for new and relevant content.

Good luck with your GISF certification journey!

Share18Tweet11
Previous Post

DVA-C02 Practice Questions Free

Next Post

Google Associate Cloud Engineer Practice Questions Free

Next Post

Google Associate Cloud Engineer Practice Questions Free

Google Professional Cloud Architect Practice Questions Free

Google Professional Cloud Database Engineer Practice Questions Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.