NSE7 OT Security 6.4 Flashcards
What are two benefits of a Nozomi integration with FortiNAC?
C. Adapter consolidation for multi-adapter hosts
D. Importation and classification of hosts
Which three criteria can a FortiGate device use to look for a matching firewall policy to process traffic? (Choose three.)
A. Services defined in the firewall policy.
B. Source defined as internet services in the firewall policy
D. Destination defined as internet services in the firewall policy
PH DEV MON
C. This is a sample of a PAM event type.
All performance events have the prefix of PH DEV MON, which means a device monitoring event, or, put another way, an event derived from a performance monitoring poll.
Which three Fortinet products can be used for device identification in an OT industrial control system (ICS)? (Choose three.)
A. FortiNAC
FortiSIEM
FortiGate
In the topology shown in the exhibit, both PLCs can communicate directly with each other, without going through the firewall.
Which statement about the topology is true?
D. There is no micro-segmentation in this topology.
In a wireless network integration, how does FortiNAC obtain connecting MAC address information?
A. RADIUS
Which three common breach points can be found in a typical OT environment? (Choose three.)
B. Hard hat
D. Black hat
E. RTU exploits
You are navigating through FortiSIEM in an OT network.
How do you view information presented in the exhibit and what does the FortiGate device security status tell you?
B. In the summary dashboard and there are one or more high-severity security incidents for the FortiGate device.
An OT network administrator is trying to implement active authentication.
Which two methods should the administrator use to achieve this? (Choose two.)
A. Two-factor authentication on FortiAuthenticator
D. Local authentication on FortiGate
An OT administrator ran a report to identify device inventory in an OT network.
Based on the report results, which report was run?
A. A FortiSIEM CMDB report
An OT administrator deployed many devices to secure the OT network. However, the SOC team is reporting that there are too many alerts, and that many of the alerts are false positive. The OT administrator would like to find a solution that eliminates repetitive tasks, improves efficiency, saves time, and saves resources.
Which products should the administrator deploy to address these issues and automate most of the manual tasks done by the SOC team?
C. FortiSOAR and FortiSIEM
You need to configure VPN user access for supervisors at the breach and HQ sites using the same soft FortiToken. Each site has a FortiGate VPN gateway.
What must you do to achieve this objective?
A. You must use a FortiAuthenticator.
An OT supervisor has configured LDAP and FSSO for the authentication. The goal is that all the users be authenticated against passive authentication first and, if passive authentication is not successful, then users should be challenged with active authentication.
What should the OT supervisor do to achieve this on FortiGate?
C. Configure a firewall policy with FSSO users and place it on the top of list of firewall policies.
An OT network architect needs to secure control area zones with a single network access policy to provision devices to any number of different networks.
On which device can this be accomplished?
D. FortiNAC
Based on the topology designed by the OT architect, which two statements about implementing OT security are true? (Choose two.)
A. Firewall policies should be configured on FortiGate-3 and FortiGate-4 with industrial protocol sensors.
C. IT and OT networks are separated by segmentation.