Fortinet NSE7_OTS-7.2 Practice Test - Questions Answers, Page 5
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 41
 
                            
                            
                                An OT network consists of multiple FortiGate devices. The edge FortiGate device is deployed as the secure gateway and is only allowing remote operators to access the ICS networks on site.
Management hires a third-party company to conduct health and safety on site. The third-party company must have outbound access to external resources.
As the OT network administrator, what is the best scenario to provide external access to the third-party company while continuing to secure the ICS networks?
Question 42
 
                            
                            
                                Which two frameworks are common to secure ICS industrial processes, including SCADA and DCS? (Choose two.)
Question 43
 
                            
                            
                                Which two statements about the Modbus protocol are true? (Choose two.)
Question 44
 
                            
                            
                                Which two statements are true when you deploy FortiGate as an offline IDS? (Choose two.)
Question 45
 
                            
                            
                                How can you achieve remote access and internet availability in an OT network?
Question 46
 
                            
                            
                                Which type of attack posed by skilled and malicious users of security level 4 (SL 4) of IEC 62443 is designed to defend against intentional attacks?
Question 47
 
                            
                            
                                The OT network analyst runs different level of reports to quickly explore threats that exploit the network. Such reports can be run on all routers, switches, and firewalls. Which FortiSIEM reporting method helps to identify these type of exploits of image firmware files?
Question 48
 
                            
                            
                                To increase security protection in an OT network, how does application control on ForliGate detect industrial traffic?
Question 49
 
                            
                            
                                What are two critical tasks the OT network auditors must perform during OT network risk assessment and management? (Choose two.)
Question 50
 
                            
                            
                                Which statement is correct about processing matched rogue devices by FortiNAC?
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question