Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

GICSP Global Industrial Cyber Security Professional (GICSP) Questions and Answers

Questions 4

The file ~, GlAC/hickory.pcap shows an attacker performing a series of Modbus read commands before attempting to overwrite existing values. Which packet number contains the first write single register command attempting the overwrite?

Options:

A.

34

B.

60

C.

84

D.

72

E.

28

F.

8

G.

25

Buy Now
Questions 5

A plant is being retrofitted with new cyber security devices in Purdue Level 3. What should the network security architect suggest for the installation?

Options:

A.

Add a firewall to segregate the cyber security devices

B.

Place the cyber security devices on their own subnet

C.

Move the cyber security devices to a DMZ

Buy Now
Questions 6

Which of the following types of network devices sends traffic only to the intended recipient node?

Options:

A.

Ethernet hub

B.

Wireless access point

C.

Ethernet switch

D.

Wireless bridge

Buy Now
Questions 7

Implementation of LDAP to manage and control access to your systems is an outcome of which NIST CSF core function?

Options:

A.

Protect

B.

Identify

C.

Respond

D.

Detect

Buy Now
Questions 8

An attacker writes a program that enters a large number of characters into the password field of a website, followed by a command. The website gave him administrative access, even though he did not use a valid username or password.

What is the name of this attack?

Options:

A.

Man-in-the-Middle

B.

Buffer overflow

C.

Cross-site scripting

D.

Fuzzing

Buy Now
Questions 9

Which control helps prevent threats to Integrity?

Options:

A.

Firewall egress filtering

B.

Logging IDS alerts

C.

Centralized LDAP authentication

D.

Implementing digital signatures

Buy Now
Questions 10

What can be configured on the router so that it can most effectively implement and enforce zones for the shown subnets?

GICSP Question 10

Options:

A.

MAC-based port security

B.

Access control lists

C.

Secure Shell

D.

802. 1x protocol

Buy Now
Questions 11

Which of the followingis a team of incident responders that often coordinate with organizations and law enforcement to reduce risks and advise on security threats?

Options:

A.

CVE

B.

COBIT

C.

CERT

D.

CVSS

Buy Now
Questions 12

Which type of device is the following configuration setting from?

deny modbus function write-multiple-holdingregisters

Options:

A.

Network firewall

B.

NIDS

C.

SIEM

D.

Application firewall

Buy Now
Questions 13

Observe the network diagram. Which of the following hosts is intended to keep ICS process data in a database?

GICSP Question 13

Options:

A.

10.10.4.11

B.

10.10.31.217

C.

10.10.4.123

D.

10.10.4.239

E.

10.103.17

Buy Now
Questions 14

Which of the following is part of the Respond function of the NIST CSF (cybersecurity framework)?

Options:

A.

Discovering malicious activity on the network using multiple sensors

B.

Performing forensics analysis on a system and eradicating malware

C.

Restoring from backup a system that had been compromised

D.

Limiting user access to only those network resources necessary for them to do their jobs

Buy Now
Questions 15

According to the DHS suggested patch decision tree, what should the next step be if there is a vulnerability with an available patch, but without an available workaround?

Options:

A.

Determine if the vulnerability affects the ICS

B.

Determine if the operational needs are greater than the risk

C.

Test and apply the patch

D.

Identify the vulnerability and the available patch

Buy Now
Questions 16

Martin is writing a document that describes in general terms how to secure embedded operating systems. The document includes issues that are specific to embedded devices vs desktop and laptop operating systems. However, it does not call out specific flavors and versions of embedded operating systems. Which type of document is Martin writing?

Options:

A.

Guideline

B.

Procedure

C.

Standard

D.

Policy

Buy Now
Questions 17

What do«$ the following command accomplish?

$ chroot /home/jdoe /bin/bash

Options:

A.

Modifies ownership of the /home/jdoe and /bin/bash directories to root

B.

Assigns root privileges to the /home/jdoe and /bin/bash directories

C.

Grants the jdoe user account root privileges when using a bash shell

D.

Changes the root directory {/) to /home/jdoe for the associated user

Buy Now
Questions 18

An attacker crafts an email that will send a user to the following site if they click a link in the message. What else is necessary for this type of attack to work?

GICSP Question 18

Options:

A.

The attacker must obtain a session cookie from an authorized HMI user

B.

The user clicking the link must be an administrator on the network

C.

The user must be authenticated to the HMI interface before clicking the link

D.

The attacker must enclose the URL parameter with <script> tags to run the code

Buy Now
Questions 19

What is an output of a Business Impact Analysis?

Options:

A.

Determining the maximum time that systems can be offline

B.

Prioritizing the business's processes

C.

Calculating the financial impact of a technology failure

D.

Understanding all of the business's technology functions

Buy Now
Questions 20

A keyed lock on a facility's back door is an example of which type of control?

Options:

A.

Avoidant

B.

Responsive

C.

Corrective

D.

Delaying

Buy Now
Questions 21

What is a benefit of MECM over VVSUS?

Options:

A.

Hardware and software inventory control

B.

Lower configuration and management overhead

C.

Minimal system resource use

D.

Lower operating and product cost

Buy Now
Questions 22

Which command can be used on a Linux system to search a file for a string of data and return the results to the screen?

Options:

A.

type

B.

cat

C.

grep

D.

tail

Buy Now
Exam Code: GICSP
Exam Name: Global Industrial Cyber Security Professional (GICSP)
Last Update: Aug 6, 2025
Questions: 75

PDF + Testing Engine

$72.6  $181.49

Testing Engine

$57.8  $144.49
buy now GICSP testing engine

PDF (Q&A)

$49.8  $124.49
buy now GICSP pdf