ExamGecko
Home / Fortinet / NSE7_OTS-7.2 / List of questions
Ask Question

Fortinet NSE7_OTS-7.2 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

An OT administrator deployed many devices to secure the OT network. However, the SOC team is reporting that there are too many alerts, and that many of the alerts are false positive. The OT administrator would like to find a solution that eliminates repetitive tasks, improves efficiency, saves time, and saves resources.

Which products should the administrator deploy to address these issues and automate most of the manual tasks done by the SOC team?

FortiSIEM and FortiManager
FortiSIEM and FortiManager
FortiSandbox and FortiSIEM
FortiSandbox and FortiSIEM
FortiSOAR and FortiSIEM
FortiSOAR and FortiSIEM
A syslog server and FortiSIEM
A syslog server and FortiSIEM
Suggested answer: C
asked 18/09/2024
stefano atzei
37 questions

Question 12

Report Export Collapse

Refer to the exhibit.

Fortinet NSE7_OTS-7.2 image Question 12 27091 09182024190808000000

You need to configure VPN user access for supervisors at the breach and HQ sites using the same soft FortiToken. Each site has a FortiGate VPN gateway.

What must you do to achieve this objective?

You must use a FortiAuthenticator.
You must use a FortiAuthenticator.
You must register the same FortiToken on more than one FortiGate.
You must register the same FortiToken on more than one FortiGate.
You must use the user self-registration server.
You must use the user self-registration server.
You must use a third-party RADIUS OTP server.
You must use a third-party RADIUS OTP server.
Suggested answer: A
asked 18/09/2024
Ervin Loong
46 questions

Question 13

Report Export Collapse

An OT supervisor has configured LDAP and FSSO for the authentication. The goal is that all the users be authenticated against passive authentication first and, if passive authentication is not successful, then users should be challenged with active authentication.

What should the OT supervisor do to achieve this on FortiGate?

Configure a firewall policy with LDAP users and place it on the top of list of firewall policies.
Configure a firewall policy with LDAP users and place it on the top of list of firewall policies.
Enable two-factor authentication with FSSO.
Enable two-factor authentication with FSSO.
Configure a firewall policy with FSSO users and place it on the top of list of firewall policies.
Configure a firewall policy with FSSO users and place it on the top of list of firewall policies.
Under config user settings configure set auth-on-demand implicit.
Under config user settings configure set auth-on-demand implicit.
Suggested answer: C
Explanation:

The OT supervisor should configure a firewall policy with FSSO users and place it on the top of list of firewall policies in order to achieve the goal of authenticating users against passive authentication first and, if passive authentication is not successful, then challenging them with active authentication.

asked 18/09/2024
JP Brune
44 questions

Question 14

Report Export Collapse

An OT network architect needs to secure control area zones with a single network access policy to provision devices to any number of different networks.

On which device can this be accomplished?

FortiGate
FortiGate
FortiEDR
FortiEDR
FortiSwitch
FortiSwitch
FortiNAC
FortiNAC
Suggested answer: A
Explanation:

An OT network architect can accomplish the goal of securing control area zones with a single network access policy to provision devices to any number of different networks on a FortiGate device.

asked 18/09/2024
Oluseyi Tijani
28 questions

Question 15

Report Export Collapse

Refer to the exhibit.

Fortinet NSE7_OTS-7.2 image Question 15 27094 09182024190808000000

Based on the topology designed by the OT architect, which two statements about implementing OT security are true? (Choose two.)

Firewall policies should be configured on FortiGate-3 and FortiGate-4 with industrial protocol sensors.
Firewall policies should be configured on FortiGate-3 and FortiGate-4 with industrial protocol sensors.
Micro-segmentation can be achieved only by replacing FortiGate-3 and FortiGate-4 with a pair of FortiSwitch devices.
Micro-segmentation can be achieved only by replacing FortiGate-3 and FortiGate-4 with a pair of FortiSwitch devices.
IT and OT networks are separated by segmentation.
IT and OT networks are separated by segmentation.
FortiGate-3 and FortiGate-4 devices must be in a transparent mode.
FortiGate-3 and FortiGate-4 devices must be in a transparent mode.
Suggested answer: A, C
asked 18/09/2024
Gary Cox
47 questions

Question 16

Report Export Collapse

Which three methods of communication are used by FortiNAC to gather visibility information? (Choose three.)

SNMP
SNMP
ICMP
ICMP
API
API
RADIUS
RADIUS
TACACS
TACACS
Suggested answer: A, C, D
asked 18/09/2024
Sterling White
52 questions

Question 17

Report Export Collapse

An OT architect has deployed a Layer 2 switch in the OT network at Level 1 the Purdue model-process control. The purpose of the Layer 2 switch is to segment traffic between PLC1 and PLC2 with two VLANs. All the traffic between PLC1 and PLC2 must first flow through the Layer 2 switch and then through the FortiGate device in the Level 2 supervisory control network.

What statement about the traffic between PLC1 and PLC2 is true?

The Layer 2 switch rewrites VLAN tags before sending traffic to the FortiGate device.
The Layer 2 switch rewrites VLAN tags before sending traffic to the FortiGate device.
The Layer 2 switches routes any traffic to the FortiGate device through an Ethernet link.
The Layer 2 switches routes any traffic to the FortiGate device through an Ethernet link.
PLC1 and PLC2 traffic must flow through the Layer-2 switch trunk link to the FortiGate device.
PLC1 and PLC2 traffic must flow through the Layer-2 switch trunk link to the FortiGate device.
In order to communicate, PLC1 must be in the same VLAN as PLC2.
In order to communicate, PLC1 must be in the same VLAN as PLC2.
Suggested answer: C
Explanation:

The statement that is true about the traffic between PLC1 and PLC2 is that PLC1 and PLC2 traffic must flow through the Layer-2 switch trunk link to the FortiGate device.

asked 18/09/2024
Nabil MHB
51 questions

Question 18

Report Export Collapse

An OT administrator is defining an incident notification policy using FortiSIEM and would like to configure the system with a notification policy. If an incident occurs, the administrator would like to be able to intervene and block an IP address or disable a user in Active Directory from FortiSIEM.

Which step must the administrator take to achieve this task?

Configure a fabric connector with a notification policy on FortiSIEM to connect with FortiGate.
Configure a fabric connector with a notification policy on FortiSIEM to connect with FortiGate.
Create a notification policy and define a script/remediation on FortiSIEM.
Create a notification policy and define a script/remediation on FortiSIEM.
Define a script/remediation on FortiManager and enable a notification rule on FortiSIEM.
Define a script/remediation on FortiManager and enable a notification rule on FortiSIEM.
Deploy a mitigation script on Active Directory and create a notification policy on FortiSIEM.
Deploy a mitigation script on Active Directory and create a notification policy on FortiSIEM.
Suggested answer: B
Explanation:

https://fusecommunity.fortinet.com/blogs/silviu/2022/04/12/fortisiempublishingscript

asked 18/09/2024
Bogdan Karolic
51 questions

Question 19

Report Export Collapse

When you create a user or host profile, which three criteria can you use? (Choose three.)

Host or user group memberships
Host or user group memberships
Administrative group membership
Administrative group membership
An existing access control policy
An existing access control policy
Location
Location
Host or user attributes
Host or user attributes
Suggested answer: A, D, E
Explanation:

https://docs.fortinet.com/document/fortinac/9.2.0/administration-guide/15797/user-host-profiles

asked 18/09/2024
marek kus
36 questions

Question 20

Report Export Collapse

Refer to the exhibit, which shows a non-protected OT environment.

Fortinet NSE7_OTS-7.2 image Question 20 27099 09182024190808000000

An administrator needs to implement proper protection on the OT network.

Which three steps should an administrator take to protect the OT network? (Choose three.)

Deploy an edge FortiGate between the internet and an OT network as a one-arm sniffer.
Deploy an edge FortiGate between the internet and an OT network as a one-arm sniffer.
Deploy a FortiGate device within each ICS network.
Deploy a FortiGate device within each ICS network.
Configure firewall policies with web filter to protect the different ICS networks.
Configure firewall policies with web filter to protect the different ICS networks.
Configure firewall policies with industrial protocol sensors
Configure firewall policies with industrial protocol sensors
Use segmentation
Use segmentation
Suggested answer: A, C, D
asked 18/09/2024
samer salami
39 questions
Total 62 questions
Go to page: of 7
Search

Related questions