Fortinet NSE7_OTS-7.2 Practice Test - Questions Answers, Page 5
List of questions
Related questions
An OT network consists of multiple FortiGate devices. The edge FortiGate device is deployed as the secure gateway and is only allowing remote operators to access the ICS networks on site.
Management hires a third-party company to conduct health and safety on site. The third-party company must have outbound access to external resources.
As the OT network administrator, what is the best scenario to provide external access to the third-party company while continuing to secure the ICS networks?
Which two frameworks are common to secure ICS industrial processes, including SCADA and DCS? (Choose two.)
Which two statements about the Modbus protocol are true? (Choose two.)
Which two statements are true when you deploy FortiGate as an offline IDS? (Choose two.)
How can you achieve remote access and internet availability in an OT network?
Which type of attack posed by skilled and malicious users of security level 4 (SL 4) of IEC 62443 is designed to defend against intentional attacks?
The OT network analyst runs different level of reports to quickly explore threats that exploit the network. Such reports can be run on all routers, switches, and firewalls. Which FortiSIEM reporting method helps to identify these type of exploits of image firmware files?
To increase security protection in an OT network, how does application control on ForliGate detect industrial traffic?
What are two critical tasks the OT network auditors must perform during OT network risk assessment and management? (Choose two.)
Which statement is correct about processing matched rogue devices by FortiNAC?
Question