Which three methods of communication are used by FortiNAC to gather visibility information? (Choose three.)
Answer : ACD
An OT architect has deployed a Layer 2 switch in the OT network at Level 1 the Purdue model-process control. The purpose of the Layer 2 switch is to segment traffic between PLC1 and PLC2 with two VLANs. All the traffic between PLC1 and PLC2 must first flow through the Layer 2 switch and then through the FortiGate device in the Level 2 supervisory control network.
What statement about the traffic between PLC1 and PLC2 is true?
Answer : C
An OT administrator is defining an incident notification policy using FortiSIEM and would like to configure the system with a notification policy. If an incident occurs, the administrator would like to be able to intervene and block an IP address or disable a user in Active Directory from FortiSIEM.
Which step must the administrator take to achieve this task?
Answer : C
Reference:
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/06918379-afd1-11e9-a989-00505692583a/Standalone_PDF.pdf
When you create a user or host profile, which three criteria can you use? (Choose three.)
Answer : ADE
Refer to the exhibit, which shows a non-protected OT environment.
Answer : ACD
An OT administrator has configured FSSO and local firewall authentication. A user who is part of a user group is not prompted from credentials during authentication.
What is a possible reason?
Answer : D
Refer to the exhibit.
Answer : A
An administrator wants to use FortiSoC and SOAR features on a FortiAnalyzer device to detect and block any unauthorized access to FortiGate devices in an OT network.
Which two statements about FortiSoC and SOAR features on FortiAnalyzer are true? (Choose two.)
Answer : BC
Ref:
https://docs.fortinet.com/document/fortianalyzer/7.0.0/administration-guide/268882/fortisoc
You are investigating a series of incidents that occurred in the OT network over past 24 hours in FortiSIEM.
Which three FortiSIEM options can you use to investigate these incidents? (Choose three.)
Answer : CDE
Refer to the exhibit.
Answer : D
When device profiling rules are enabled, which devices connected on the network are evaluated by the device profiling rules?
Answer : C
What two advantages does FortiNAC provide in the OT network? (Choose two.)
Answer : CD
What triggers Layer 2 polling of infrastructure devices connected in the network?
Answer : D
An OT administrator configured and ran a default application risk and control report in FortiAnalyzer to learn more about the key application crossing the network.
However, the report output is empty despite the fact that some related real-time and historical logs are visible in the FortiAnalyzer.
What are two possible reasons why the report output was empty? (Choose two.)
Answer : BD
An OT supervisor needs to protect their network by implementing security with an industrial signature database on the FortiGate device.
Which statement about the industrial signature database on FortiGate is true?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us