ExamGecko
Home / Fortinet / NSE7_OTS-7.2 / List of questions
Ask Question

Fortinet NSE7_OTS-7.2 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

Refer to the exhibit.

Fortinet NSE7_OTS-7.2 image Question 31 27110 09182024190808000000

Based on the Purdue model, which three measures can be implemented in the control area zone using the Fortinet Security Fabric? (Choose three.)

FortiGate for SD-WAN
FortiGate for SD-WAN
FortiGate for application control and IPS
FortiGate for application control and IPS
FortiNAC for network access control
FortiNAC for network access control
FortiSIEM for security incident and event management
FortiSIEM for security incident and event management
FortiEDR for endpoint detection
FortiEDR for endpoint detection
Suggested answer: B, C, E
asked 18/09/2024
Ali S Zahedi
44 questions

Question 32

Report Export Collapse

What can be assigned using network access control policies?

Layer 3 polling intervals
Layer 3 polling intervals
FortiNAC device polling methods
FortiNAC device polling methods
Logical networks
Logical networks
Profiling rules
Profiling rules
Suggested answer: C
asked 18/09/2024
William Macy
59 questions

Question 33

Report Export Collapse

As an OT administrator, it is important to understand how industrial protocols work in an OT network.

Which communication method is used by the Modbus protocol?

It uses OSI Layer 2 and the primary device sends data based on request from secondary device.
It uses OSI Layer 2 and the primary device sends data based on request from secondary device.
It uses OSI Layer 2 and both the primary/secondary devices always send data during the communication.
It uses OSI Layer 2 and both the primary/secondary devices always send data during the communication.
It uses OSI Layer 2 and both the primary/secondary devices send data based on a matching token ring.
It uses OSI Layer 2 and both the primary/secondary devices send data based on a matching token ring.
It uses OSI Layer 2 and the secondary device sends data based on request from primary device.
It uses OSI Layer 2 and the secondary device sends data based on request from primary device.
Suggested answer: D
asked 18/09/2024
Sergio Guerra
49 questions

Question 34

Report Export Collapse

Refer to the exhibit.

Fortinet NSE7_OTS-7.2 image Question 34 27113 09182024190808000000

An OT architect has implemented a Modbus TCP with a simulation server Conpot to identify and control the Modus traffic in the OT network. The FortiGate-Edge device is configured with a software switch interface ssw-01.

Based on the topology shown in the exhibit, which two statements about the successful simulation of traffic between client and server are true? (Choose two.)

The FortiGate-Edge device must be in NAT mode.
The FortiGate-Edge device must be in NAT mode.
NAT is disabled in the FortiGate firewall policy from port3 to ssw-01.
NAT is disabled in the FortiGate firewall policy from port3 to ssw-01.
The FortiGate devices is in offline IDS mode.
The FortiGate devices is in offline IDS mode.
Port5 is not a member of the software switch.
Port5 is not a member of the software switch.
Suggested answer: A, B
asked 18/09/2024
Dusan Munjiza
53 questions

Question 35

Report Export Collapse

An OT network architect must deploy a solution to protect fuel pumps in an industrial remote network. All the fuel pumps must be closely monitored from the corporate network for any temperature fluctuations.

How can the OT network architect achieve this goal?

Configure a fuel server on the remote network, and deploy a FortiSIEM with a single pattern temperature security rule on the corporate network.
Configure a fuel server on the remote network, and deploy a FortiSIEM with a single pattern temperature security rule on the corporate network.
Configure a fuel server on the corporate network, and deploy a FortiSIEM with a single pattern temperature performance rule on the remote network.
Configure a fuel server on the corporate network, and deploy a FortiSIEM with a single pattern temperature performance rule on the remote network.
Configure a fuel server on the remote network, and deploy a FortiSIEM with a single pattern temperature performance rule on the corporate network.
Configure a fuel server on the remote network, and deploy a FortiSIEM with a single pattern temperature performance rule on the corporate network.
Configure both fuel server and FortiSIEM with a single-pattern temperature performance rule on the corporate network.
Configure both fuel server and FortiSIEM with a single-pattern temperature performance rule on the corporate network.
Suggested answer: C
Explanation:

This way, FortiSIEM can discover and monitor everything attached to the remote network and provide security visibility to the corporate network

asked 18/09/2024
Ashad Conley
42 questions

Question 36

Report Export Collapse

Refer to the exhibit.

Fortinet NSE7_OTS-7.2 image Question 36 27115 09182024190808000000

PLC-3 and CLIENT can send traffic to PLC-1 and PLC-2. FGT-2 has only one software switch (SSW-1) connecting both PLC-3 and CLIENT. PLC-3 and CLIENT can send traffic to each other at the Layer 2 level.

What must the OT admin do to prevent Layer 2-level communication between PLC-3 and CLIENT?

Set a unique forward domain for each interface of the software switch.
Set a unique forward domain for each interface of the software switch.
Create a VLAN for each device and replace the current FGT-2 software switch members.
Create a VLAN for each device and replace the current FGT-2 software switch members.
Enable explicit intra-switch policy to require firewall policies on FGT-2.
Enable explicit intra-switch policy to require firewall policies on FGT-2.
Implement policy routes on FGT-2 to control traffic between devices.
Implement policy routes on FGT-2 to control traffic between devices.
Suggested answer: A, B
asked 18/09/2024
helal altarsha
39 questions

Question 37

Report Export Collapse

As an OT network administrator, you are managing three FortiGate devices that each protect different levels on the Purdue model. To increase traffic visibility, you are required to implement additional security measures to detect exploits that affect PLCs.

Which security sensor must implement to detect these types of industrial exploits?

Become a Premium Member for full access
  Unlock Premium Member

Question 38

Report Export Collapse

Refer to the exhibit.

Fortinet NSE7_OTS-7.2 image Question 38 27117 09182024190808000000

An OT network security audit concluded that the application sensor requires changes to ensure the correct security action is committed against the overrides filters.

Which change must the OT network administrator make?

Become a Premium Member for full access
  Unlock Premium Member

Question 39

Report Export Collapse

Refer to the exhibits.

Fortinet NSE7_OTS-7.2 image Question 39 27118 09182024190808000000

Which statement is true about the traffic passing through to PLC-2?

Become a Premium Member for full access
  Unlock Premium Member

Question 40

Report Export Collapse

Refer to the exhibit.

Fortinet NSE7_OTS-7.2 image Question 40 27119 09182024190808000000

An operational technology rule is created and successfully activated to monitor the Modbus protocol on FortiSIEM. However, the rule does not trigger incidents despite Modbus traffic and application logs being received correctly by FortiSIEM.

Which statement correctly describes the issue on the rule configuration?

Become a Premium Member for full access
  Unlock Premium Member
Total 62 questions
Go to page: of 7
Search

Related questions