ExamGecko
Home Home / Fortinet / NSE7_OTS-7.2

Fortinet NSE7_OTS-7.2 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

You are assigned to implement a remote authentication server in the OT network.

Which part of the hierarchy should the authentication server be part of?

A.
Edge
A.
Edge
Answers
B.
Cloud
B.
Cloud
Answers
C.
Core
C.
Core
Answers
D.
Access
D.
Access
Answers
Suggested answer: A

A FortiGate device is newly deployed as the edge gateway of an OT network security fabric. The downstream FortiGate devices are also newly deployed as Security Fabric leafs to protect the control area zone.

With no additional essential networking devices, and to implement micro-segmentation on this OT network, what configuration must the OT network architect apply to control intra-VLAN traffic?

A.
Enable transparent mode on the edge FortiGate device.
A.
Enable transparent mode on the edge FortiGate device.
Answers
B.
Enable security profiles on all interfaces connected in the control area zone.
B.
Enable security profiles on all interfaces connected in the control area zone.
Answers
C.
Set up VPN tunnels between downstream and edge FortiGate devices.
C.
Set up VPN tunnels between downstream and edge FortiGate devices.
Answers
D.
Create a software switch on each downstream FortiGate device.
D.
Create a software switch on each downstream FortiGate device.
Answers
Suggested answer: C

FortiAnalyzer is implemented in the OT network to receive logs from responsible FortiGate devices. The logs must be processed by FortiAnalyzer.

In this scenario, which statement is correct about the purpose of FortiAnalyzer receiving and processing multiple log messages from a given PLC or RTU?

A.
To isolate PLCs or RTUs in the event of external attacks
A.
To isolate PLCs or RTUs in the event of external attacks
Answers
B.
To configure event handlers and take further action on FortiGate
B.
To configure event handlers and take further action on FortiGate
Answers
C.
To determine which type of messages from the PLC or RTU causes issues in the plant
C.
To determine which type of messages from the PLC or RTU causes issues in the plant
Answers
D.
To help OT administrators configure the network and prevent breaches
D.
To help OT administrators configure the network and prevent breaches
Answers
Suggested answer: B

Refer to the exhibit.

The IPS profile is added on all of the security policies on FortiGate.

For an OT network, which statement of the IPS profile is true?

A.
FortiGate has no IPS industrial signature database enabled.
A.
FortiGate has no IPS industrial signature database enabled.
Answers
B.
The listed IPS signatures are classified as SCADAapphcat nns
B.
The listed IPS signatures are classified as SCADAapphcat nns
Answers
C.
All IPS signatures are overridden and must block traffic match signature patterns.
C.
All IPS signatures are overridden and must block traffic match signature patterns.
Answers
D.
The IPS profile inspects only traffic originating from SCADA equipment.
D.
The IPS profile inspects only traffic originating from SCADA equipment.
Answers
Suggested answer: B

With the limit of using one firewall device, the administrator enables multi-VDOM on FortiGate to provide independent multiple security domains to each ICS network. Which statement ensures security protection is in place for all ICS networks?

A.
Each traffic VDOM must have a direct connection to FortiGuard services to receive the required security updates.
A.
Each traffic VDOM must have a direct connection to FortiGuard services to receive the required security updates.
Answers
B.
The management VDOM must have access to all global security services.
B.
The management VDOM must have access to all global security services.
Answers
C.
Each VDOM must have an independent security license.
C.
Each VDOM must have an independent security license.
Answers
D.
Traffic between VDOMs must pass through the physical interfaces of FortiGate to check for security incidents.
D.
Traffic between VDOMs must pass through the physical interfaces of FortiGate to check for security incidents.
Answers
Suggested answer: D

Refer to the exhibit.

PLC-3 and CLIENT can send traffic to PLC-1 and PLC-2. FGT-2 has only one software switch (SSW-1) connecting both PLC-3 and CLIENT. PLC-3 and CLIENT cannot send traffic to each other.

Which two statements about the traffic between PCL-1 and PLC-2 are true? (Choose two.)

A.
The switch on FGT-2 must be hardware to implement micro-segmentation.
A.
The switch on FGT-2 must be hardware to implement micro-segmentation.
Answers
B.
Micro-segmentation on FGT-2 prevents direct device-to-device communication.
B.
Micro-segmentation on FGT-2 prevents direct device-to-device communication.
Answers
C.
Traffic must be inspected by FGT-EDGE in OT networks.
C.
Traffic must be inspected by FGT-EDGE in OT networks.
Answers
D.
FGT-2 controls intra-VLAN traffic through firewall policies.
D.
FGT-2 controls intra-VLAN traffic through firewall policies.
Answers
Suggested answer: B, D

Which three Fortinet products can you use for device identification in an OT industrial control system (ICS)? (Choose three.)

A.
FortiSIEM
A.
FortiSIEM
Answers
B.
FortiManager
B.
FortiManager
Answers
C.
FortiAnalyzer
C.
FortiAnalyzer
Answers
D.
FortiGate
D.
FortiGate
Answers
E.
FortiNAC
E.
FortiNAC
Answers
Suggested answer: A, D, E

Refer to the exhibit.

In order for a FortiGate device to act as router on a stick, what configuration must an OT network architect implement on FortiGate to achieve inter-VLAN routing?

A.
Set a unique forward domain on each interface on the network.
A.
Set a unique forward domain on each interface on the network.
Answers
B.
Set FortiGate to operate in transparent mode.
B.
Set FortiGate to operate in transparent mode.
Answers
C.
Set a software switch on FortiGate to handle inter-VLAN traffic.
C.
Set a software switch on FortiGate to handle inter-VLAN traffic.
Answers
D.
Set a FortiGate interface with the switch to operate as an 802.1 q trunk.
D.
Set a FortiGate interface with the switch to operate as an 802.1 q trunk.
Answers
Suggested answer: D

The OT network analyst run different level of reports to quickly explore failures that could put the network at risk. Such reports can be about device performance. Which FortiSIEM reporting method helps to identify device failures?

A.
Business service reports
A.
Business service reports
Answers
B.
Device inventory reports
B.
Device inventory reports
Answers
C.
CMDB operational reports
C.
CMDB operational reports
Answers
D.
Active dependent rules reports
D.
Active dependent rules reports
Answers
Suggested answer: C

Which statemenl about the IEC 104 protocol is true?

A.
IEC 104 is used for telecontrol SCADA in electrical engineering applications.
A.
IEC 104 is used for telecontrol SCADA in electrical engineering applications.
Answers
B.
IEC 104 is IEC 101 compliant in old SCADA systems.
B.
IEC 104 is IEC 101 compliant in old SCADA systems.
Answers
C.
IEC 104 protects data transmission between OT devices and services.
C.
IEC 104 protects data transmission between OT devices and services.
Answers
D.
IEC 104 uses non-TCP/IP standards.
D.
IEC 104 uses non-TCP/IP standards.
Answers
Suggested answer: A
Total 62 questions
Go to page: of 7