Global Industrial Cyber Security Professional (GICSP) Questions and Answers
Which type of server would be deployed to provide stratum level 2 clock synchronization for ICS systems?
Which of the following would use round-robin process scheduling?
What is a benefit of MECM over VVSUS?
From the GIAC directory on the Desktop, open gicsp.pcap in Wireshark and filter for USB Capture data. Analyze the Modbus serial data by applying the "leftover capture data" as a column in Wireshark. In packet 28, what read function is requested? Use the protocol description in the image.
Which type of process is used to manufacture fuels, chemicals, and plastics?
Which of the following devices would indicate an enforcement boundary?
Which of the following types of network devices sends traffic only to the intended recipient node?
How arc general purpose Programmable Logic Controllers (PLC) different than smart field devices?
In the context of ICS the process of fuzzing a device is described as which of the following?
Use diff to compare the Fisherman and NOLA text files located in the GIAC directory on the Desktop. Which word exists in one file, that does not exist in the other?
During a plant upgrade an architect needs to connect legacy lEDs to a new TCP/IP instrumentation LAN. The lEDs only have RS-232 communication interfaces available. What would best be used to connect the lEDs?
The head of an IT department sent a directive stating that all company communication must use TLS in order to prevent unauthorized disclosure of information. Which part of the C-l-A model is the head of IT concerned with?
An administrator relaxes the password policy during disaster recovery operations. What is the result of this action?
An engineer has analyzed a subsystem of a power plant and identified physical and logical inputs that could expose the subsystem to unauthorized access. What has the engineer defined?
What is a recommended practice for securing historians and databases whose purpose is to feed data back into the control processes?
Which of the following can an attacker gain by obtaining PLC logic project files for a SCADA system?
What are the last four digits of the hash created when using openssl with the md5 digest on -/GlAC/film?
What type of physical security control is a procedure that details what to do in the event of a security breach?
An attacker writes a program that enters a large number of characters into the password field of a website, followed by a command. The website gave him administrative access, even though he did not use a valid username or password.
What is the name of this attack?
What is a characteristic of Windows Server Update Services (WSUS) in an ICS environment?
Which command can be used on a Linux system to search a file for a string of data and return the results to the screen?
Which of the following is located in user mode of a typical realtime OS, but in kernel mode of a typical standard OS?