
OT 7.2
Authored by Sergio Ortiz
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
43 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The IPS profile is added on all of the security policies on FortiGate. For an OT network, which statement of the IPS profile is true?
FortiGate has no IPS industrial signature database enabled
The listed IPS signatures are classified as SCADAapphcat nns
All IPS signatures are overridden and must block traffic match signature patterns
The IPS profile inspects only traffic originating from SCADA equipment.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
With the limit of using one firewall device, the administrator enables multi-VDOM on FortiGate to provide independent multiple security domains to each ICS network. Which statement ensures security protection is in place for all ICS networks?
Each traffic VDOM must have a direct connection to FortiGuard services to receive the required security updates.
The management VDOM must have access to all global security services
Each VDOM must have an independent security license
Traffic between VDOMs must pass through the physical interfaces of FortiGate to check for security incidents.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Based on the Purdue model, which three measures can be implemented in the control area zone using the Fortinet Security Fabric? (Choose three.)
FortiGate for SD-WAN
FortiGate for application control and IPS
FortiNAC for network access control
FortiSIEM for security incident and event management
FortiEDR for endpoint detection
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can be assigned using network access control policies?
Layer 3 polling intervals
FortiNAC device polling methods
Logical networks
Profiling rules
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
FortiAnalyzer is implemented in the OT network to receive logs from responsible FortiGate devices. The logs must be processed by FortiAnalyzer.
In this scenario, which statement is correct about the purpose of FortiAnalyzer receiving and processing multiple log messages from a given PLC or RTU?
To isolate PLCs or RTUs in the event of external attacks
To configure event handlers and take further action on FortiGate
To determine which type of messages from the PLC or RTU causes issues in the plant
To help OT administrators configure the network and prevent breaches
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As an OT administrator, it is important to understand how industrial protocols work in an OT network.
Which communication method is used by the Modbus protocol?
It uses OSI Layer 2 and the primary device sends data based on request from secondary device.
It uses OSI Layer 2 and both the primary/secondary devices always send data during the communication.
It uses OSI Layer 2 and both the primary/secondary devices send data based on a matching token ring.
It uses OSI Layer 2 and the secondary device sends data based on request from primary device.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The OT network analyst runs different level of reports to quickly explore threats that exploit the network. Such reports can be run on all routers, switches, and firewalls. Which FortiSIEM reporting method helps to identify these type of exploits of image firmware files?
CMDB reports
Threat hunting reports
Compliance reports
OT/loT reports
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?