Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the GIAC Cyber Security GICSP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GICSP Premium Access

View all detail and faqs for the GICSP exam


414 Students Passed

88% Average Score

94% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is an output of a Business Impact Analysis?

Options:

A.

Determining the maximum time that systems can be offline

B.

Prioritizing the business's processes

C.

Calculating the financial impact of a technology failure

D.

Understanding all of the business's technology functions

Questions # 2:

Which resource includes a standardized categorization of common software vulnerabilities?

Options:

A.

CWE

B.

CVSS

C.

CSC

D.

CIP

Questions # 3:

How arc general purpose Programmable Logic Controllers (PLC) different than smart field devices?

Options:

A.

Smart field devices cannot be controlled centrally from a management server

B.

Programmable Logic Controllers are usually microcontroller-based

C.

Programmable Logic Controllers have a more limited purpose and function

D.

Smart field devices contain their own control logic that cannot be changed

Questions # 4:

What is a use of Network Address Translation?

Options:

A.

To maximize Firewall functionality

B.

To make access list configuration easier

C.

To hide private network addresses

D.

To enable network routing functionality

Questions # 5:

Which of the following types of network devices sends traffic only to the intended recipient node?

Options:

A.

Ethernet hub

B.

Wireless access point

C.

Ethernet switch

D.

Wireless bridge

Questions # 6:

Which of the following would use round-robin process scheduling?

Options:

A.

Embedded device on the plant floor

B.

Temperature sensor in the field

C.

Operator workstation in the control room

D.

Data-diode at an enforcement boundary

Questions # 7:

For application-aware firewalls filtering traffic between trust zones, which of the following policies should be applied to a packet that doesn't match an existing rule?

Options:

A.

Default alert

B.

Default deny

C.

Application deny list

D.

Application allow list

Questions # 8:

Based on the following diagram, how many Active Directory domains should be created for this network?

Question # 8

Options:

A.

One domain with separate groups within

B.

Two separate domains within the same tree

C.

Two separate domains without a trust relationship

D.

One domain with transitive trust

Questions # 9:

During a plant upgrade an architect needs to connect legacy lEDs to a new TCP/IP instrumentation LAN. The lEDs only have RS-232 communication interfaces available. What would best be used to connect the lEDs?

Options:

A.

Data diode

B.

Engineering workstation

C.

Communications Gateway

D.

Industrial switch

Questions # 10:

Which command can be used on a Linux system to search a file for a string of data and return the results to the screen?

Options:

A.

type

B.

cat

C.

grep

D.

tail

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.