Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

GICSP Global Industrial Cyber Security Professional (GICSP) Questions and Answers

Questions 4

What are the last four digits of the hash created when using openssl with the md5 digest on -/GlAC/film?

Options:

A.

c3d0

B.

054a

C.

f9d0

D.

a77f

E.

6157

F.

14f9

G.

3a46

Buy Now
Questions 5

What type of physical security control is a procedure that details what to do in the event of a security breach?

Options:

A.

Responsive

B.

Detective

C.

Delaying

D.

Deterrence

Buy Now
Questions 6

How could Wireshark be utilized in an attack against devices at Purdue levels 0 or 1?

Options:

A.

Capture serial and fieldbus communications sent by networked devices

B.

Capture communications between chips on a board

C.

Detect open ports on a device by sending packets and analyzing the responses

D.

Detect asymmetrical keys by identifying randomness in a data dump

E.

Brute force crypto keys in an encrypted pcap file

Buy Now
Questions 7

Which type of server would be deployed to provide stratum level 2 clock synchronization for ICS systems?

Options:

A.

RADIUS

B.

PTP

C.

TFTP

D.

ARP

Buy Now
Questions 8

Which command can be used on a Linux system to search a file for a string of data and return the results to the screen?

Options:

A.

type

B.

cat

C.

grep

D.

tail

Buy Now
Questions 9

An administrator relaxes the password policy during disaster recovery operations. What is the result of this action?

Options:

A.

Negative effect on recovery point objective (RPO)

B.

Positive effect on recovery time objective (RTO)

C.

Increased risk

D.

Reduced insurance needs

Buy Now
Questions 10

An attacker writes a program that enters a large number of characters into the password field of a website, followed by a command. The website gave him administrative access, even though he did not use a valid username or password.

What is the name of this attack?

Options:

A.

Man-in-the-Middle

B.

Buffer overflow

C.

Cross-site scripting

D.

Fuzzing

Buy Now
Questions 11

Which type of process is described below?

A fementor's glycol jacket must maintain a steady temperature during and between batches of beer.

Options:

A.

Continuous

B.

Manual

C.

Discrete

D.

Batch

Buy Now
Questions 12

Which of the following is a containment task within the six step incident handling process?

Options:

A.

Checking to ensure that the most recent patches were deployed to a web application server

B.

Creating a forensic image of a compromised workstation

C.

Re-imaging a workstation that was exhibiting worm-like behaviour

D.

Validate fix using a vulnerability scan of the hosts within the DMZ

Buy Now
Questions 13

The head of an IT department sent a directive stating that all company communication must use TLS in order to prevent unauthorized disclosure of information. Which part of the C-l-A model is the head of IT concerned with?

Options:

A.

Identity

B.

Availability

C.

Authorization

D.

Confidentiality

E.

Integrity

Buy Now
Questions 14

What is a recommended practice for securing historians and databases whose purpose is to feed data back into the control processes?

Options:

A.

Audit both successful and failed login attempts to databases

B.

Facilitate auditing by placing historians and databases in the same DMZ

C.

Use a dedicated domain admin user account to manage databases

D.

Use reliable network protocols like HTTP for remote management

Buy Now
Questions 15

Which type of process is used to manufacture fuels, chemicals, and plastics?

Options:

A.

Discrete

B.

Batch

C.

Continuous

Buy Now
Questions 16

A keyed lock on a facility's back door is an example of which type of control?

Options:

A.

Avoidant

B.

Responsive

C.

Corrective

D.

Delaying

Buy Now
Questions 17

What is a characteristic of the Ladder Diagram approach for programming controllers?

Options:

A.

Is similar to a low level programming language like assembly

B.

May be similar to high level computer programming languages like C

C.

Uses steps to execute commands and transitions to wait for conditions to move forward

D.

Based on circuit diagrams of relay logic hardware and operates on rules rather than procedures

Buy Now
Questions 18

During a plant upgrade an architect needs to connect legacy lEDs to a new TCP/IP instrumentation LAN. The lEDs only have RS-232 communication interfaces available. What would best be used to connect the lEDs?

Options:

A.

Data diode

B.

Engineering workstation

C.

Communications Gateway

D.

Industrial switch

Buy Now
Questions 19

From the GIAC directory on the Desktop, open gicsp.pcap in Wireshark and filter for USB Capture data. Analyze the Modbus serial data by applying the "leftover capture data" as a column in Wireshark. In packet 28, what read function is requested? Use the protocol description in the image.

Options:

A.

0x09

B.

0x0a

C.

0x08

D.

0x02

E.

0x06

F.

0x01

G.

0x05

Buy Now
Questions 20

Based on the following diagram, how many Active Directory domains should be created for this network?

GICSP Question 20

Options:

A.

One domain with separate groups within

B.

Two separate domains within the same tree

C.

Two separate domains without a trust relationship

D.

One domain with transitive trust

Buy Now
Questions 21

Which of the following can an attacker gain by obtaining PLC logic project files for a SCADA system?

Options:

A.

Data regarding personnel and hiring practices

B.

Details about the network architecture

C.

Information about operational firewall rulesets

D.

Schedule of vendor product releases

Buy Now
Questions 22

What can be configured on the router so that it can most effectively implement and enforce zones for the shown subnets?

GICSP Question 22

Options:

A.

MAC-based port security

B.

Access control lists

C.

Secure Shell

D.

802. 1x protocol

Buy Now
Exam Code: GICSP
Exam Name: Global Industrial Cyber Security Professional (GICSP)
Last Update: Aug 6, 2025
Questions: 75

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now GICSP testing engine

PDF (Q&A)

$36.75  $104.99
buy now GICSP pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 18 Aug 2025