Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the GIAC Cyber Security GICSP Questions and answers with ValidTests

Exam GICSP All Questions
Exam GICSP Premium Access

View all detail and faqs for the GICSP exam

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following technologies uses Secure Simple Pairing (SSP) to pair devices?

Options:

A.

Zigbee

B.

Bluetooth

C.

WirelessHART

D.

ISA100.11a

Expert Solution
Questions # 2:

A keyed lock on a facility's back door is an example of which type of control?

Options:

A.

Avoidant

B.

Responsive

C.

Corrective

D.

Delaying

Expert Solution
Questions # 3:

Which of the following is a facilitated tabletop exercise that is run in odd years and provides an overall public Lessons Learned report each year it is run?

Options:

A.

CRPA

B.

E-ISAC

C.

GridEx

D.

CTEP

Expert Solution
Questions # 4:

The file ~, GlAC/hickory.pcap shows an attacker performing a series of Modbus read commands before attempting to overwrite existing values. Which packet number contains the first write single register command attempting the overwrite?

Options:

A.

34

B.

60

C.

84

D.

72

E.

28

F.

8

G.

25

Expert Solution
Questions # 5:

Which of the following devices would indicate an enforcement boundary?

Options:

A.

An application with a login screen

B.

A workstation with antivirus

C.

A router with ACLs

D.

A switch with VLANs

Expert Solution
Questions # 6:

What are the last four digits of the hash created when using openssl with the md5 digest on -/GlAC/film?

Options:

A.

c3d0

B.

054a

C.

f9d0

D.

a77f

E.

6157

F.

14f9

G.

3a46

Expert Solution
Questions # 7:

The head of an IT department sent a directive stating that all company communication must use TLS in order to prevent unauthorized disclosure of information. Which part of the C-l-A model is the head of IT concerned with?

Options:

A.

Identity

B.

Availability

C.

Authorization

D.

Confidentiality

E.

Integrity

Expert Solution
Questions # 8:

Which type of process is described below?

Question # 8

Options:

A.

Distributed

B.

Continuous

C.

Batch

D.

Discrete

Expert Solution
Questions # 9:

Which of the following is part of the Respond function of the NIST CSF (cybersecurity framework)?

Options:

A.

Discovering malicious activity on the network using multiple sensors

B.

Performing forensics analysis on a system and eradicating malware

C.

Restoring from backup a system that had been compromised

D.

Limiting user access to only those network resources necessary for them to do their jobs

Expert Solution
Questions # 10:

An engineer has analyzed a subsystem of a power plant and identified physical and logical inputs that could expose the subsystem to unauthorized access. What has the engineer defined?

Options:

A.

A vulnerability scan

B.

An attack surface

C.

A risk analysis

D.

A threat model

Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions