Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

GICSP Global Industrial Cyber Security Professional (GICSP) Questions and Answers

Questions 4

A brewer uses a local HMI to communicate with a controller that opens a pump to move the work from the boil kettle to the fermentor. What level of the Purdue model would the controller be considered?

Options:

A.

Level 2

B.

Level 1

C.

Level 0

D.

Level 3

E.

Level 4

Buy Now
Questions 5

Which type of device is the following configuration setting from?

deny modbus function write-multiple-holdingregisters

Options:

A.

Network firewall

B.

NIDS

C.

SIEM

D.

Application firewall

Buy Now
Questions 6

An organization has their ICS operations and networking equipment installed in the Purdue model level 3. Where should the SIEM for this equipment be placed in relation to the existing Level 3 devices?

Options:

A.

On a different subnet in Level 3

B.

On a management subnet in Level 4

C.

On a management subnet in Level 2

D.

On the same subnet in Level 3

Buy Now
Questions 7

How arc general purpose Programmable Logic Controllers (PLC) different than smart field devices?

Options:

A.

Smart field devices cannot be controlled centrally from a management server

B.

Programmable Logic Controllers are usually microcontroller-based

C.

Programmable Logic Controllers have a more limited purpose and function

D.

Smart field devices contain their own control logic that cannot be changed

Buy Now
Questions 8

From the GIAC directory on the Desktop, open gicsp.pcap in Wireshark and filter for USB Capture data. Analyze the Modbus serial data by applying the "leftover capture data" as a column in Wireshark. In packet 28, what read function is requested? Use the protocol description in the image.

Options:

A.

0x09

B.

0x0a

C.

0x08

D.

0x02

E.

0x06

F.

0x01

G.

0x05

Buy Now
Questions 9

For a SQL injection login authentication bypass to work on a website, it will contain a username comparison that the database finds to be true. What else is required for the bypass to work?

Options:

A.

An unencrypted login page

B.

The database's comment characters

C.

Two pipe characters (||)

D.

The correct password

Buy Now
Questions 10

What is a characteristic of the Ladder Diagram approach for programming controllers?

Options:

A.

Is similar to a low level programming language like assembly

B.

May be similar to high level computer programming languages like C

C.

Uses steps to execute commands and transitions to wait for conditions to move forward

D.

Based on circuit diagrams of relay logic hardware and operates on rules rather than procedures

Buy Now
Questions 11

The head of an IT department sent a directive stating that all company communication must use TLS in order to prevent unauthorized disclosure of information. Which part of the C-l-A model is the head of IT concerned with?

Options:

A.

Identity

B.

Availability

C.

Authorization

D.

Confidentiality

E.

Integrity

Buy Now
Questions 12

What do«$ the following command accomplish?

$ chroot /home/jdoe /bin/bash

Options:

A.

Modifies ownership of the /home/jdoe and /bin/bash directories to root

B.

Assigns root privileges to the /home/jdoe and /bin/bash directories

C.

Grants the jdoe user account root privileges when using a bash shell

D.

Changes the root directory {/) to /home/jdoe for the associated user

Buy Now
Questions 13

How can virtualization be leveraged in an ICS environment?

Options:

A.

Increasing networking speed

B.

Testing new patches

C.

Sharing hardware resources across security levels

D.

Increasing processing speed

Buy Now
Questions 14

Use sqlmap to dump tables from http://locjlhost/index.php? page-login, php.The data necessary for this is as follows:

GICSP Question 14

How many tables does sqlmap find in the dojo control database? Hint: The option to dump tables is –tables

Options:

A.

3

B.

86

C.

82

D.

84

E.

1

F.

83

G.

4

Buy Now
Questions 15

Which control helps prevent threats to Integrity?

Options:

A.

Firewall egress filtering

B.

Logging IDS alerts

C.

Centralized LDAP authentication

D.

Implementing digital signatures

Buy Now
Questions 16

An administrator relaxes the password policy during disaster recovery operations. What is the result of this action?

Options:

A.

Negative effect on recovery point objective (RPO)

B.

Positive effect on recovery time objective (RTO)

C.

Increased risk

D.

Reduced insurance needs

Buy Now
Questions 17

Which of the following is a team of incident responders that often coordinate with organizations and law enforcement to reduce risks and advise on security threats?

Options:

A.

CVE

B.

COBIT

C.

CERT

D.

CVSS

Buy Now
Questions 18

What information can be found by dumping data at rest from a Purdue Enterprise Reference Architecture level 0/1 device?

Options:

A.

Firmware on read-protected chip

B.

Frequency-hopping algorithm that the RF chip will use

C.

Static cryptographic keys

Buy Now
Questions 19

What kind of data could be found on a historian?

Options:

A.

Information needed for billing customers

B.

Information for supervising lower-level controllers in real-time

C.

Diagrams depicting an overview of the process

D.

Runtime libraries that software programs use

Buy Now
Questions 20

What mechanism could help defeat an attacker's attempt to hide evidence of his/her actions on the target system?

Options:

A.

Attack surface analysis

B.

Application allow lists

C.

Sand boxing

D.

Centralized logging

Buy Now
Questions 21

Which resource includes a standardized categorization of common software vulnerabilities?

Options:

A.

CWE

B.

CVSS

C.

CSC

D.

CIP

Buy Now
Questions 22

Which of the following is a protocol that will provide control center-to-control center SCADA communications in a situation where each of the control centers implement a different vendor-supplied protocol internally?

Options:

A.

ICCP

B.

DNP3

C.

BACnet

D.

Modbus/TCP

E.

MMS

Buy Now
Exam Code: GICSP
Exam Name: Global Industrial Cyber Security Professional (GICSP)
Last Update: May 21, 2026
Questions: 75

PDF + Testing Engine

$64.99  $185.69

Testing Engine

$49.99  $142.83
buy now GICSP testing engine

PDF (Q&A)

$54.99  $157.11
buy now GICSP pdf