GICSP Global Industrial Cyber Security Professional (GICSP) Questions and Answers
A brewer uses a local HMI to communicate with a controller that opens a pump to move the work from the boil kettle to the fermentor. What level of the Purdue model would the controller be considered?
Which type of device is the following configuration setting from?
deny modbus function write-multiple-holdingregisters
An organization has their ICS operations and networking equipment installed in the Purdue model level 3. Where should the SIEM for this equipment be placed in relation to the existing Level 3 devices?
How arc general purpose Programmable Logic Controllers (PLC) different than smart field devices?
From the GIAC directory on the Desktop, open gicsp.pcap in Wireshark and filter for USB Capture data. Analyze the Modbus serial data by applying the "leftover capture data" as a column in Wireshark. In packet 28, what read function is requested? Use the protocol description in the image.
For a SQL injection login authentication bypass to work on a website, it will contain a username comparison that the database finds to be true. What else is required for the bypass to work?
What is a characteristic of the Ladder Diagram approach for programming controllers?
The head of an IT department sent a directive stating that all company communication must use TLS in order to prevent unauthorized disclosure of information. Which part of the C-l-A model is the head of IT concerned with?
Use sqlmap to dump tables from http://locjlhost/index.php? page-login, php.The data necessary for this is as follows:

How many tables does sqlmap find in the dojo control database? Hint: The option to dump tables is –tables
An administrator relaxes the password policy during disaster recovery operations. What is the result of this action?
Which of the following is a team of incident responders that often coordinate with organizations and law enforcement to reduce risks and advise on security threats?
What information can be found by dumping data at rest from a Purdue Enterprise Reference Architecture level 0/1 device?
What mechanism could help defeat an attacker's attempt to hide evidence of his/her actions on the target system?
Which resource includes a standardized categorization of common software vulnerabilities?
Which of the following is a protocol that will provide control center-to-control center SCADA communications in a situation where each of the control centers implement a different vendor-supplied protocol internally?
