OTS_7.2
Quiz
•
Instructional Technology
•
Professional Development
•
Practice Problem
•
Easy
Javier Huamani
Used 4+ times
FREE Resource
Enhance your content in a minute
61 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
1. An OT network administrator is trying to implement active authentication.
Which two methods should the administrator use to achieve this? (Choose two.)
1. An OT network administrator is trying to implement active authentication.
Which two methods should the administrator use to achieve this? (Choose two.)
D. Local authentication on FortiGate
A. Two-factor authentication on FortiAuthenticator
C. FSSO authentication on FortiGate
B. Role-based authentication on FortiNAC
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
2. To increase security protection in an OT network, how does application control on ForliGate detect industrial traffic?
2. To increase security protection in an OT network, how does application control on ForliGate detect industrial traffic?
C. By inspecting applications with more granularity by inspecting subapplication traffic
A. By inspecting software and software-based vulnerabilities
D. By inspecting protocols used in the application traffic
B. By inspecting applications only on nonprotected traffic
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
3. Which two statements about the Modbus protocol are true? (Choose two.)
3. Which two statements about the Modbus protocol are true? (Choose two.)
C. You can implement Modbus networking settings on internetworking devices.
A. Modbus uses UDP frames to transport MBAP and function codes.
D. Modbus is used to establish communication between intelligent devices.
B. Most of the PLC brands come with a built-in Modbus module.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
4. An OT administrator deployed many devices to secure the OT network. However, the SOC team is reporting that there are too many alerts, and that many of the alerts are false positive. The OT administrator would like to find a solution that eliminates repetitive tasks, improves efficiency, saves time, and saves resources.
Which products should the administrator deploy to address these issues and automate most of the manual tasks done by the SOC team?
4. An OT administrator deployed many devices to secure the OT network. However, the SOC team is reporting that there are too many alerts, and that many of the alerts are false positive. The OT administrator would like to find a solution that eliminates repetitive tasks, improves efficiency, saves time, and saves resources.
Which products should the administrator deploy to address these issues and automate most of the manual tasks done by the SOC team?
C. FortiSOAR and FortiSIEM
A. FortiSIEM and FortiManager
D. A syslog server and FortiSIEM
B. FortiSandbox and FortiSIEM
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
5. You are navigating through FortiSIEM in an OT network. An OT administrator deployed many devices to secure the OT network. However, the SOC team is reporting that there are too many alerts, and that many of the alerts are false positive. The OT administrator would like to find a solution that eliminates repetitive tasks, improves efficiency, saves time, and saves resources. Which products should the administrator deploy to address these issues and automate most of the manual tasks done by the SOC team? A. FortiSIEM and FortiManager B. FortiSandbox and FortiSIEM C. FortiSOAR and FortiSIEM How do you view information presented in the exhibit and what does the FortiGate device security status tell you?
5. You are navigating through FortiSIEM in an OT network. An OT administrator deployed many devices to secure the OT network. However, the SOC team is reporting that there are too many alerts, and that many of the alerts are false positive. The OT administrator would like to find a solution that eliminates repetitive tasks, improves efficiency, saves time, and saves resources. Which products should the administrator deploy to address these issues and automate most of the manual tasks done by the SOC team? A. FortiSIEM and FortiManager B. FortiSandbox and FortiSIEM C. FortiSOAR and FortiSIEM How do you view information presented in the exhibit and what does the FortiGate device security status tell you?
D. In the business service dashboard and there are one or more high-severity security incidents for the Fortigate device.
A. In the PCI logging dashboard and there are one or more high-severity security incidents for the FortiGate device.
C. In the widget dashboard and there are one or more high-severity incidents for the FortiGate device.
B. In the summary dashboard and there are one or more high-severity security incidents for the FortiGate device.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
6. Refer to the exhibit.
-
-
-
-
-
Which statement about the interfaces shown in the exhibit is true?
6. Refer to the exhibit.
-
-
-
-
-
Which statement about the interfaces shown in the exhibit is true?
B. The VLAN ID of port1-vlan1 can be changed to the VLAN ID 10.
A. port2, port2-vlan10, and port2-vlan1 are part of the software switch interface.
D. port1, port1-vlan10, and port1-vlan1 are in different broadcast domains
C. port1-vlan10 and port2-vlan10 are part of the same broadcast domain
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
7. Which three methods of communication are used by FortiNAC to gather visibility information? (Choose A. Configure outbound security policies with limited active authentication users of the third-party company. B. Create VPN tunnels between downstream FortiGate devices and the edge FortiGate to protect ICS network traffic. C. Split the edge FortiGate device into multiple logical devices to allocate an independent VDOM for the third-party company. D. Implement an additional firewall using an additional upstream link to the internet. Answer: C three.)
7. Which three methods of communication are used by FortiNAC to gather visibility information? (Choose A. Configure outbound security policies with limited active authentication users of the third-party company. B. Create VPN tunnels between downstream FortiGate devices and the edge FortiGate to protect ICS network traffic. C. Split the edge FortiGate device into multiple logical devices to allocate an independent VDOM for the third-party company. D. Implement an additional firewall using an additional upstream link to the internet. Answer: C three.)
D. RADIUS
A. SNMP
E. TACACS
C. API
B. ICMP
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
15 questions
Solving Equations with Variables on Both Sides Review
Quiz
•
8th Grade
Discover more resources for Instructional Technology
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
20 questions
Disney Characters
Quiz
•
Professional Development
20 questions
Customer Service
Quiz
•
Professional Development
10 questions
Food Idioms
Quiz
•
Professional Development
20 questions
NCCER Power Tools Quiz
Quiz
•
Professional Development
