Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

GIAC GICSP Dumps

Page: 1 / 8
Total 75 questions

Global Industrial Cyber Security Professional (GICSP) Questions and Answers

Question 1

Which type of server would be deployed to provide stratum level 2 clock synchronization for ICS systems?

Options:

A.

RADIUS

B.

PTP

C.

TFTP

D.

ARP

Question 2

Which of the following would use round-robin process scheduling?

Options:

A.

Embedded device on the plant floor

B.

Temperature sensor in the field

C.

Operator workstation in the control room

D.

Data-diode at an enforcement boundary

Question 3

What is a benefit of MECM over VVSUS?

Options:

A.

Hardware and software inventory control

B.

Lower configuration and management overhead

C.

Minimal system resource use

D.

Lower operating and product cost

Question 4

From the GIAC directory on the Desktop, open gicsp.pcap in Wireshark and filter for USB Capture data. Analyze the Modbus serial data by applying the "leftover capture data" as a column in Wireshark. In packet 28, what read function is requested? Use the protocol description in the image.

Options:

A.

0x09

B.

0x0a

C.

0x08

D.

0x02

E.

0x06

F.

0x01

G.

0x05

Question 5

Which type of process is used to manufacture fuels, chemicals, and plastics?

Options:

A.

Discrete

B.

Batch

C.

Continuous

Question 6

Which of the following devices would indicate an enforcement boundary?

Options:

A.

An application with a login screen

B.

A workstation with antivirus

C.

A router with ACLs

D.

A switch with VLANs

Question 7

Which of the following types of network devices sends traffic only to the intended recipient node?

Options:

A.

Ethernet hub

B.

Wireless access point

C.

Ethernet switch

D.

Wireless bridge

Question 8

How arc general purpose Programmable Logic Controllers (PLC) different than smart field devices?

Options:

A.

Smart field devices cannot be controlled centrally from a management server

B.

Programmable Logic Controllers are usually microcontroller-based

C.

Programmable Logic Controllers have a more limited purpose and function

D.

Smart field devices contain their own control logic that cannot be changed

Question 9

In the context of ICS the process of fuzzing a device is described as which of the following?

Options:

A.

Brute force password attacks against default accounts

B.

Launching all known exploits at the device in a randomized sequence

C.

Providing invalid, unexpected, or random data as inputs

D.

Monitoring device performance in varying power conditions

E.

Monitoring device performance in harsh environmental conditions

Question 10

Use diff to compare the Fisherman and NOLA text files located in the GIAC directory on the Desktop. Which word exists in one file, that does not exist in the other?

Options:

A.

Species

B.

Directions

C.

Betray

D.

Express

E.

Teacher

F.

Inspire

G.

Distort

Question 11

During a plant upgrade an architect needs to connect legacy lEDs to a new TCP/IP instrumentation LAN. The lEDs only have RS-232 communication interfaces available. What would best be used to connect the lEDs?

Options:

A.

Data diode

B.

Engineering workstation

C.

Communications Gateway

D.

Industrial switch

Question 12

The head of an IT department sent a directive stating that all company communication must use TLS in order to prevent unauthorized disclosure of information. Which part of the C-l-A model is the head of IT concerned with?

Options:

A.

Identity

B.

Availability

C.

Authorization

D.

Confidentiality

E.

Integrity

Question 13

An administrator relaxes the password policy during disaster recovery operations. What is the result of this action?

Options:

A.

Negative effect on recovery point objective (RPO)

B.

Positive effect on recovery time objective (RTO)

C.

Increased risk

D.

Reduced insurance needs

Question 14

An engineer has analyzed a subsystem of a power plant and identified physical and logical inputs that could expose the subsystem to unauthorized access. What has the engineer defined?

Options:

A.

A vulnerability scan

B.

An attack surface

C.

A risk analysis

D.

A threat model

Question 15

What is a recommended practice for securing historians and databases whose purpose is to feed data back into the control processes?

Options:

A.

Audit both successful and failed login attempts to databases

B.

Facilitate auditing by placing historians and databases in the same DMZ

C.

Use a dedicated domain admin user account to manage databases

D.

Use reliable network protocols like HTTP for remote management

Question 16

Which of the following can an attacker gain by obtaining PLC logic project files for a SCADA system?

Options:

A.

Data regarding personnel and hiring practices

B.

Details about the network architecture

C.

Information about operational firewall rulesets

D.

Schedule of vendor product releases

Question 17

What are the last four digits of the hash created when using openssl with the md5 digest on -/GlAC/film?

Options:

A.

c3d0

B.

054a

C.

f9d0

D.

a77f

E.

6157

F.

14f9

G.

3a46

Question 18

What type of physical security control is a procedure that details what to do in the event of a security breach?

Options:

A.

Responsive

B.

Detective

C.

Delaying

D.

Deterrence

Question 19

An attacker writes a program that enters a large number of characters into the password field of a website, followed by a command. The website gave him administrative access, even though he did not use a valid username or password.

What is the name of this attack?

Options:

A.

Man-in-the-Middle

B.

Buffer overflow

C.

Cross-site scripting

D.

Fuzzing

Question 20

What is a characteristic of Windows Server Update Services (WSUS) in an ICS environment?

Options:

A.

Requires the clients to connect to the Internet to download patches

B.

Inventories both hardware and software within an Active Directory domain

C.

Allows the administrator to create custom groups of computers

Question 21

Which command can be used on a Linux system to search a file for a string of data and return the results to the screen?

Options:

A.

type

B.

cat

C.

grep

D.

tail

Question 22

Which of the following is located in user mode of a typical realtime OS, but in kernel mode of a typical standard OS?

Options:

A.

Interprocess communication

B.

Virtual memory

C.

Device drivers

D.

Process scheduling

Page: 1 / 8
Total 75 questions