Pass the Fortinet NSE 7 Network Security Architect NSE7_OTS-7.2 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

An OT administrator configured and ran a default application risk and control report in FortiAnalyzer to learn more about the key application crossing the network. However, the report output is empty despite the fact that some related real-time and historical logs are visible in the FortiAnalyzer.

What are two possible reasons why the report output was empty? (Choose two.)

Options:

A.

The administrator selected the wrong logs to be indexed in FortiAnalyzer.


B.

The administrator selected the wrong time period for the report.


C.

The administrator selected the wrong devices in the Devices section.


D.

The administrator selected the wrong hcache table for the report.


Expert Solution
Questions # 2:

Refer to the exhibit.

Question # 2

PLC-3 and CLIENT can send traffic to PLC-1 and PLC-2. FGT-2 has only one software switch (SSW-1) connecting both PLC-3 and CLIENT. PLC-3 and CLIENT cannot send traffic to each other.

Which two statements about the traffic between PCL-1 and PLC-2 are true? (Choose two.)

Options:

A.

The switch on FGT-2 must be hardware to implement micro-segmentation.


B.

Micro-segmentation on FGT-2 prevents direct device-to-device communication.


C.

Traffic must be inspected by FGT-EDGE in OT networks.


D.

FGT-2 controls intra-VLAN traffic through firewall policies.


Expert Solution
Questions # 3:

An OT architect has deployed a Layer 2 switch in the OT network at Level 1 the Purdue model-process control. The purpose of the Layer 2 switch is to segment traffic between PLC1 and PLC2 with two VLANs. All the traffic between PLC1 and PLC2 must first flow through the Layer 2 switch and then through the FortiGate device in the Level 2 supervisory control network.

What statement about the traffic between PLC1 and PLC2 is true?

Options:

A.

The Layer 2 switch rewrites VLAN tags before sending traffic to the FortiGate device.


B.

The Layer 2 switches routes any traffic to the FortiGate device through an Ethernet link.


C.

PLC1 and PLC2 traffic must flow through the Layer-2 switch trunk link to the FortiGate device.


D.

In order to communicate, PLC1 must be in the same VLAN as PLC2.


Expert Solution
Questions # 4:

A FortiGate device is newly deployed as the edge gateway of an OT network security fabric. The downstream FortiGate devices are also newly deployed as Security Fabric leafs to protect the control area zone.

With no additional essential networking devices, and to implement micro-segmentation on this OT network, what configuration must the OT network architect apply to control intra-VLAN traffic?

Options:

A.

Enable transparent mode on the edge FortiGate device.


B.

Enable security profiles on all interfaces connected in the control area zone.


C.

Set up VPN tunnels between downstream and edge FortiGate devices.


D.

Create a software switch on each downstream FortiGate device.


Expert Solution
Questions # 5:

In a wireless network integration, how does FortiNAC obtain connecting MAC address information?

Options:

A.

RADIUS


B.

Link traps


C.

End station traffic monitoring


D.

MAC notification traps


Expert Solution
Questions # 6:

An OT administrator has configured FSSO and local firewall authentication. A user who is part of a user group is not prompted from credentials during authentication.

What is a possible reason?

Options:

A.

FortiGate determined the user by passive authentication


B.

The user was determined by Security Fabric


C.

Two-factor authentication is not configured with RADIUS authentication method


D.

FortiNAC determined the user by DHCP fingerprint method


Expert Solution
Questions # 7:

Refer to the exhibit.

Question # 7

The IPS profile is added on all of the security policies on FortiGate.

For an OT network, which statement of the IPS profile is true?

Options:

A.

FortiGate has no IPS industrial signature database enabled.


B.

The listed IPS signatures are classified as SCADA equipment.


C.

All IPS signatures are overridden and must block traffic match signature patterns.


D.

The IPS profile inspects only traffic originating from SCADA equipment.


Expert Solution
Questions # 8:

Which two statements are true when you deploy FortiGate as an offline IDS? (Choose two.)

Options:

A.

FortiGate receives traffic from configured port mirroring.


B.

Network traffic goes through FortiGate.


C.

FortiGate acts as network sensor.


D.

Network attacks can be detected and blocked.


Expert Solution
Questions # 9:

An OT network consists of multiple FortiGate devices. The edge FortiGate device is deployed as the secure gateway and is only allowing remote operators to access the ICS networks on site.

Management hires a third-party company to conduct health and safety on site. The third-party company must have outbound access to external resources.

As the OT network administrator, what is the best scenario to provide external access to the third-party company while continuing to secure the ICS networks?

Options:

A.

Configure outbound security policies with limited active authentication users of the third-party company.


B.

Create VPN tunnels between downstream FortiGate devices and the edge FortiGate to protect ICS network traffic.


C.

Split the edge FortiGate device into multiple logical devices to allocate an independent VDOM for the third-party company.


D.

Implement an additional firewall using an additional upstream link to the internet.


Expert Solution
Questions # 10:

An OT administrator deployed many devices to secure the OT network. However, the SOC team is reporting that there are too many alerts, and that many of the alerts are false positive. The OT administrator would like to find a solution that eliminates repetitive tasks, improves efficiency, saves time, and saves resources.

Which products should the administrator deploy to address these issues and automate most of the manual tasks done by the SOC team?

Options:

A.

FortiSIEM and FortiManager


B.

FortiSandbox and FortiSIEM


C.

FortiSOAR and FortiSIEM


D.

A syslog server and FortiSIEM


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions