Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GICSP GIAC Global Industrial Cyber Security Professional (GICSP) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GICSP Global Industrial Cyber Security Professional (GICSP) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 75 questions

For application-aware firewalls filtering traffic between trust zones, which of the following policies should be applied to a packet that doesn't match an existing rule?

A.

Default alert

B.

Default deny

C.

Application deny list

D.

Application allow list

What kind of data could be found on a historian?

A.

Information needed for billing customers

B.

Information for supervising lower-level controllers in real-time

C.

Diagrams depicting an overview of the process

D.

Runtime libraries that software programs use

Martin is writing a document that describes in general terms how to secure embedded operating systems. The document includes issues that are specific to embedded devices vs desktop and laptop operating systems. However, it does not call out specific flavors and versions of embedded operating systems. Which type of document is Martin writing?

A.

Guideline

B.

Procedure

C.

Standard

D.

Policy

What approach can an organization use to make sure that high consequence, low probability risks are considered during risk analysis?

A.

Prioritize risks based on impact

B.

Give frequency a higher weight

C.

Prioritize risks based on mitigation cost

D.

Give likelihood a higher weight

A keyed lock on a facility's back door is an example of which type of control?

A.

Avoidant

B.

Responsive

C.

Corrective

D.

Delaying

Which of the following is part of the Respond function of the NIST CSF (cybersecurity framework)?

A.

Discovering malicious activity on the network using multiple sensors

B.

Performing forensics analysis on a system and eradicating malware

C.

Restoring from backup a system that had been compromised

D.

Limiting user access to only those network resources necessary for them to do their jobs

What is a recommended practice for securing historians and databases whose purpose is to feed data back into the control processes?

A.

Audit both successful and failed login attempts to databases

B.

Facilitate auditing by placing historians and databases in the same DMZ

C.

Use a dedicated domain admin user account to manage databases

D.

Use reliable network protocols like HTTP for remote management

What mechanism could help defeat an attacker's attempt to hide evidence of his/her actions on the target system?

A.

Attack surface analysis

B.

Application allow lists

C.

Sand boxing

D.

Centralized logging

An attacker writes a program that enters a large number of characters into the password field of a website, followed by a command. The website gave him administrative access, even though he did not use a valid username or password.

What is the name of this attack?

A.

Man-in-the-Middle

B.

Buffer overflow

C.

Cross-site scripting

D.

Fuzzing

Which of the following is located in user mode of a typical realtime OS, but in kernel mode of a typical standard OS?

A.

Interprocess communication

B.

Virtual memory

C.

Device drivers

D.

Process scheduling

According to the DHS suggested patch decision tree, what should the next step be if there is a vulnerability with an available patch, but without an available workaround?

A.

Determine if the vulnerability affects the ICS

B.

Determine if the operational needs are greater than the risk

C.

Test and apply the patch

D.

Identify the vulnerability and the available patch

A brewer uses a local HMI to communicate with a controller that opens a pump to move the workfrom the boil kettle to the fermentor. What level of the Purdue model would the controller be considered?

A.

Level 2

B.

Level 1

C.

Level 0

D.

Level 3

E.

Level 4

Based on the following diagram, how many Active Directory domains should be created for this network?

A.

One domain with separate groups within

B.

Two separate domains within the same tree

C.

Two separate domains without a trust relationship

D.

One domain with transitive trust

An organization wants to use Active Directory to manage systems within its Business and Control system networks. Which of the following is the recommended security practice?

A.

Shared Active Directory domain with separate domain controllers for the Business and Control system networks

B.

An Active Directory domain for the Business network and a Windows workgroup with a domain controller for the Control system network

C.

Separate Active Directory domains for the Business and Control system networks

D.

Shared Active Directory domain with fully functional domain controllers for the Business network and a Read-Only Domain Controller for the Control system network

What are the last four digits of the hash created when using openssl with the md5 digest on -/GlAC/film?

A.

c3d0

B.

054a

C.

f9d0

D.

a77f

E.

6157

F.

14f9

G.

3a46

Which type of process is described below?

A.

Distributed

B.

Continuous

C.

Batch

D.

Discrete

An attacker crafts an email that will send a user to the following site if they click a link in the message. What else is necessary for this type of attack to work?

A.

The attacker must obtain a session cookie from an authorized HMI user

B.

The user clicking the link must be an administrator on the network

C.

The user must be authenticated to the HMI interface before clicking the link

D.

The attacker must enclose the URL parameter with <script> tags to run the code

Which of the following devices would indicate an enforcement boundary?

A.

An application with a login screen

B.

A workstation with antivirus

C.

A router with ACLs

D.

A switch with VLANs

What do the following protocols have in common?

A.

Use of IPv6 in the network layer

B.

Use in RF mesh networks

C.

Ability to use asymmetric join methods

D.

Ability to tunnel legacy protocols

Which resource includes a standardized categorization of common software vulnerabilities?

A.

CWE

B.

CVSS

C.

CSC

D.

CIP

Page: 1 / 2
Total 75 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved