GISP Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day
Getting ready for the GISP certification? Our GISP Exam Prep Free resource includes 50 exam-style questions designed to help you practice effectively and feel confident on test day
Effective GISP exam prep free is the key to success. With our free practice questions, you can:
- Get familiar with exam format and question style
- Identify which topics you’ve mastered—and which need more review
- Boost your confidence and reduce exam anxiety
Below, you will find 50 realistic GISP Exam Prep Free questions that cover key exam topics. These questions are designed to reflect the structure and challenge level of the actual exam, making them perfect for your study routine.
?
A. Physically destroying the media and the information stored on it.
B. Assessing the risk involved in discarding particular information.
C. Verifying the identity of a person, network host, or system process.
D. Removing the content from the media so that it is difficult to restore.
Which of the following are tunneling protocols? Each correct answer represents a complete solution. Choose two.
A. SMTP
B. NNTP
C. L2TP
D. PPTP
Which of the following can be used to protect a computer system from malware, viruses, spyware, and various types of keyloggers? Each correct answer represents a complete solution. Choose all that apply.
A. SocketShield
B. Enum
C. KFSensor
D. Sheep dip
Which of the following authentication protocols provides support for a wide range of authentication methods, such as smart cards and certificates?
A. EAP
B. CHAP
C. MS-CHAP v2
D. PAP
?
A. Firewall
B. Internet
C. LAN
D. VPN
You work as a Network Administrator for NetTech Inc. The company's network is connected to the Internet. For security, you want to restrict unauthorized access to the network with minimum administrative effort. You want to implement a hardware-based solution. What will you do to accomplish this?
A. Connect a brouter to the network.
B. Implement firewall on the network.
C. Connect a router to the network.
D. Implement a proxy server on the network.
provide in an e-commerce system? Each correct answer represents a complete solution. Choose two.
A. Credit
B. Trust
C. Transparency
D. Identification
The 802.11b wireless standard has a data transfer speed of up to ________.
A. 11Mbps
B. 110Mbps
C. 54Mbps
D. 56Mbps
Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?
A. IPSec
B. NAT
C. Firewall
D. MAC address
Which of the following is a signature-based intrusion detection system (IDS) ?
A. StealthWatch
B. Snort
C. RealSecure
D. Tripwire
are true? Each correct answer represents a complete solution. Choose two.
A. It identifies a user who sends a message.
B. It is created by implementing a public-key encryption.
C. It is created by implementing a private-key encryption.
D. It identifies a user who deletes a message.
Which of the following is the process of overwriting all addressable locations on a disk?
A. Sanitization
B. Authentication
C. Spoofing
D. Drive wiping
Which of the following involves identifying and minimizing the effect of risks?
A. Risk profile
B. Recovery plan
C. Risk plan
D. Risk retention
Which of the following are the major tasks of risk management? Each correct answer represents a complete solution. Choose two.
A. Building Risk free systems
B. Risk control
C. Risk identification
D. Assuring the integrity of organizational data
Which of the following services does Internet Information Server (IIS) provide along with HTTP? Each correct answer represents a complete solution. Choose three.
A. SMTP
B. FTP
C. PPTP
D. NNTP
Which of the following defines the communication link between a Web server and Web applications?
A. PGP
B. CGI
C. IETF
D. Firewall
You work as a professional Ethical Hacker. You are assigned a project to test the security of www.we-are-secure.com. You are working on the Windows Server 2003 operating system. You suspect that your friend has installed the keyghost keylogger onto your computer. Which of the following countermeasures would you employ in such a situation? Each correct answer represents a complete solution. Choose all that apply.
A. Use on-screen keyboards and speech-to-text conversion software which can also be useful agains keyloggers, as there are no typing or mouse movements involved.
B. Remove the SNMP agent or disable the SNMP service.
C. Use commercially available anti-keyloggers such as PrivacyKeyboard.
D. Monitor the programs running on the server to see whether any new process is running on the server or not.
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He notices that UDP port 137 of the We-are-secure server is open. Assuming that the Network Administrator of We-are-secure Inc. has not changed the default port values of the services, which of the following services is running on UDP port 137?
A. HTTPS
B. HTTP
C. TELNET
D. NetBIOS
Which of the following methods of authentication uses finger prints to identify users?
A. Biometrics
B. PKI
C. Kerberos
D. Mutual authentication
Which of the following security models dictates that subjects can only access objects through applications?
A. Biba-Clark model
B. Bell-LaPadula
C. Biba model
D. Clark-Wilson
model? Each correct answer represents a complete solution. Choose two.
A. User’s group
B. Access rights and permissions
C. File and data ownership
D. Smart card
Which of the following actions might cause a privacy breach while surfing the Internet?
A. Clicking pop-up windows while visiting a Web site.
B. Conducting only secure transactions.
C. Deleting mails from unknown sources.
D. Ignoring banner ads on Web sites.
Which of the following is used to repair missing or damaged system files that might prevent Windows from starting correctly?
A. Boot Repair
B. System Repair
C. Recovery Repair
D. Startup Repair
Which of the following defines the communication link between a Web server and Web applications?
A. Firewall
B. IETF
C. CGI
D. PGP
Which of the following is the rating for paper or wood fires?
A. Class B
B. Class A
C. Class D
D. Class C
Which of the following rated systems of the Orange book has mandatory protection of the TCB?
A. B-rated
B. A-rated
C. D-rated
D. C-rated
Which of the following are examples of passive attacks? Each correct answer represents a complete solution. Choose all that apply.
A. Shoulder surfing
B. Dumpster diving
C. Placing a backdoor
D. Eavesdropping
volume disk configuration for fault tolerance. What is the minimum number of disk drives required for implementing RAID-5 volumes?
A. Thirty-two
B. Two
C. Three
D. One
You work as a Network Administrator for Infonet Inc. The company's network is connected to the Internet. The network has a Web server that is accessible to Internet users. For security, you want to keep the Web server separate from other servers on the network. Where will you place the Web server?
A. In a virtual private network (VPN)
B. With the authentication server
C. In a demilitarized zone (DMZ)
D. With the database server
?
A. UDP port 1701
B. UDP port 161
C. TCP port 443
D. TCP port 110
is true?
A. It is a UDP attack that involves spoofing and flooding.
B. It is an ICMP attack that involves spoofing and flooding.
C. It is a denial of service (DoS) attack that leaves TCP ports open.
D. It is an attack with IP fragments that cannot be reassembled.
Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?
A. Type II
B. Type I
C. Type III
D. Type IV
In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?
A. Fragmentation overlap attack
B. Evasion attack
C. Fragmentation overwrite attack
D. Insertion attack
What does TACACS stand for?
A. Terminal Authorized Control Access Cyber System
B. Terminal Adapter Controlling Access Control System
C. Terminal Access Controller Access Control System
D. Transfer Access Controller Auto Control System
Identify whether the given statement is true or false. "Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."
A. False
B. True
authentication is true?
A. A user provides his user name and password for authentication.
B. A user uses a smart card for authentication.
C. A sensor scans some physical characteristics of a user and sends that information to the authentication server.
D. A user is issued a device that is used for authentication.
is true?
A. It is a computer that is used to resolve the NetBIOS name to an IP address.
B. It is a computer that is used to resolve the host name to an IP address.
C. It is a computer that is accessible from the Internet to collect information about internal networks.
D. It is a computer that must be made secure because it is accessible from the Internet and hence is more vulnerable to attacks.
Which of the following terms is used for the process of securing a system or a device on a network infrastructure?
A. Authentication
B. Sanitization
C. Hardening
D. Cryptography
is true?
A. It is used to store information about confidential data.
B. It is used to send confidential data on the public network.
C. It allows or restricts the flow of encrypted packets to provide security.
D. It allows or restricts the flow of specific types of packets to provide security.
Which of the following protocols is used to query and modify information stored within the directory services?
A. PPTP
B. ARP
C. PAP
D. LDAP
Which of the following is used by attackers to obtain an authenticated connection on a network?
A. Back door
B. Replay attack
C. Denial-of-Service (DoS) attack
D. Man-in-the-middle attack
This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as __________.
A. File virus
B. Polymorphic virus
C. Stealth virus
D. Multipartite virus
E. Boot sector virus
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are- secure network is vulnerable to a man-inthe- middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants. Which of the following cryptographic algorithms is being used by the Weare- secure server?
A. RSA
B. Diffie-Hellman
C. Twofish
D. Blowfish
SIMULATION - Fill in the blank with the appropriate value. Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.
Which of the following are the common roles with regard to data in an information classification program? Each correct answer represents a complete solution. Choose all that apply.
A. User
B. Owner
C. Custodian
D. Security auditor
E. Editor
Which of the following security models deal only with integrity? Each correct answer represents a complete solution. Choose two.
A. Biba
B. Bell-LaPadula
C. Biba-Wilson
D. Clark-Wilson
service? Each correct answer represents a complete solution. Choose two.
A. 443
B. 20
C. 21
D. 80
Which of the following types of coaxial cable is used for cable TV and cable modems?
A. RG-62
B. RG-59
C. RG-8
D. RG-58
Which of the following is a term used to refer to access of a wireless Internet connection by bringing one's own computer within the range of another's wireless connection, and using that service without the subscriber's explicit permission or knowledge?
A. Mail bombing
B. Piggybacking
C. Spoofing
D. Snooping
Identify whether the given statement is true or false. "Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network."
A. False
B. True
Access Full GISP Exam Prep Free
Want to go beyond these 50 questions? Click here to unlock a full set of GISP exam prep free questions covering every domain tested on the exam.
We continuously update our content to ensure you have the most current and effective prep materials.
Good luck with your GISP certification journey!