Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Fortinet NSE 7 Network Security Architect NSE7_OTS-7.2 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which two statements are true when you deploy FortiGate as an offline IDS? (Choose two.)

Options:

A.

FortiGate receives traffic from configured port mirroring.


B.

Network traffic goes through FortiGate.


C.

FortiGate acts as network sensor.


D.

Network attacks can be detected and blocked.


Expert Solution
Questions # 12:

Refer to the exhibits.

Question # 12

Which statement is true about the traffic passing through to PLC-2?

Options:

A.

IPS must be enabled to inspect application signatures.


B.

The application filter overrides the default action of some IEC 104 signatures.


C.

IEC 104 signatures are all allowed except the C.BO.NA 1 signature.


D.

SSL Inspection must be set to deep-inspection to correctly apply application control.


Expert Solution
Questions # 13:

An OT administrator has configured FSSO and local firewall authentication. A user who is part of a user group is not prompted from credentials during authentication.

What is a possible reason?

Options:

A.

FortiGate determined the user by passive authentication


B.

The user was determined by Security Fabric


C.

Two-factor authentication is not configured with RADIUS authentication method


D.

FortiNAC determined the user by DHCP fingerprint method


Expert Solution
Questions # 14:

Refer to the exhibit.

Question # 14

You are assigned to implement a remote authentication server in the OT network.

Which part of the hierarchy should the authentication server be part of?

Options:

A.

Edge


B.

Cloud


C.

Core


D.

Access


Expert Solution
Questions # 15:

Refer to the exhibit.

Question # 15

An OT administrator ran a report to identify device inventory in an OT network.

Based on the report results, which report was run?

Options:

A.

A FortiSIEM CMDB report


B.

A FortiAnalyzer device report


C.

A FortiSIEM incident report


D.

A FortiSIEM analytics report


Expert Solution
Questions # 16:

Refer to the exhibit.

Question # 16

You are creating a new operational technology (OT) rule to monitor Modbus protocol traffic on FortiSIEM

Which action must you take to ensure that all Modbus messages on the network match the rule?

Options:

A.

Add a new condition to filter Modbus traffic based on the source TCP/UDP port


B.

The condition on the SubPattern filter must use the AND logical operator


C.

the Aggregate section, set the attribute value to equal to or greater than 0


D.

In the Group By section remove all attributes that are not configured in the Filter section


Expert Solution
Questions # 17:

An OT supervisor needs to protect their network by implementing security with an industrial signature database on the FortiGate device.

Which statement about the industrial signature database on FortiGate is true?

Options:

A.

A supervisor must purchase an industrial signature database and import it to the FortiGate.


B.

An administrator must create their own database using custom signatures.


C.

By default, the industrial database is enabled.


D.

A supervisor can enable it through the FortiGate CLI.


Expert Solution
Questions # 18:

As an OT network administrator you are managing three FortiGate devices that each protect different levels on the Purdue model To increase traffic visibility you are required to implement additional security measures to detect protocols from PLCs

Which security sensor must you implement to detect protocols on the OT network?

Options:

A.

Endpoint Detection and Response (EDR)


B.

Deep packet inspection (DPI)


C.

Intrusion prevention system (IPS)


D.

Application control (AC)


Expert Solution
Questions # 19:

Which three Fortinet products can you use for device identification in an OT industrial control system (ICS)? (Choose three.)

Options:

A.

FortiSIEM


B.

FortiManager


C.

FortiAnalyzer


D.

FortiGate


E.

FortiNAC


Expert Solution
Questions # 20:

Refer to the exhibit.

Question # 20

You need to configure VPN user access for supervisors at the breach and HQ sites using the same soft FortiToken. Each site has a FortiGate VPN gateway.

What must you do to achieve this objective?

Options:

A.

You must use a FortiAuthenticator.


B.

You must register the same FortiToken on more than one FortiGate.


C.

You must use the user self-registration server.


D.

You must use a third-party RADIUS OTP server.


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions