OT 7.2

OT 7.2

Professional Development

•

43 Qs

quiz-placeholder

Similar activities

ICT-PRETEST

ICT-PRETEST

Professional Development

•

20 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

•

20 Qs

3rd day revision ict training(3rd phase)

3rd day revision ict training(3rd phase)

Professional Development

•

20 Qs

4th Day Revision ( 2nd Phase ICT Training)

4th Day Revision ( 2nd Phase ICT Training)

Professional Development

•

20 Qs

PSPC1

PSPC1

Professional Development

•

20 Qs

HAM - E0 & E1

HAM - E0 & E1

Professional Development

•

20 Qs

PRE TEST-BASIC VIDEO EDITING WORKSHOP

PRE TEST-BASIC VIDEO EDITING WORKSHOP

Professional Development

•

20 Qs

DSP_Prelim Quiz

DSP_Prelim Quiz

Professional Development

•

20 Qs

OT 7.2

OT 7.2

Assessment

Quiz

•

Computers

•

Professional Development

•

Practice Problem

•

Hard

Created by

Sergio Ortiz

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

43 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The IPS profile is added on all of the security policies on FortiGate. For an OT network, which statement of the IPS profile is true?

FortiGate has no IPS industrial signature database enabled

The listed IPS signatures are classified as SCADAapphcat nns

All IPS signatures are overridden and must block traffic match signature patterns

The IPS profile inspects only traffic originating from SCADA equipment.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

With the limit of using one firewall device, the administrator enables multi-VDOM on FortiGate to provide independent multiple security domains to each ICS network. Which statement ensures security protection is in place for all ICS networks?

Each traffic VDOM must have a direct connection to FortiGuard services to receive the required security updates.

The management VDOM must have access to all global security services

Each VDOM must have an independent security license

Traffic between VDOMs must pass through the physical interfaces of FortiGate to check for security incidents.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Media Image

Based on the Purdue model, which three measures can be implemented in the control area zone using the Fortinet Security Fabric? (Choose three.)

FortiGate for SD-WAN

FortiGate for application control and IPS

FortiNAC for network access control

FortiSIEM for security incident and event management

FortiEDR for endpoint detection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can be assigned using network access control policies?

Layer 3 polling intervals

FortiNAC device polling methods

Logical networks

Profiling rules

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

FortiAnalyzer is implemented in the OT network to receive logs from responsible FortiGate devices. The logs must be processed by FortiAnalyzer.

In this scenario, which statement is correct about the purpose of FortiAnalyzer receiving and processing multiple log messages from a given PLC or RTU?

To isolate PLCs or RTUs in the event of external attacks

To configure event handlers and take further action on FortiGate

To determine which type of messages from the PLC or RTU causes issues in the plant

To help OT administrators configure the network and prevent breaches

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As an OT administrator, it is important to understand how industrial protocols work in an OT network.

Which communication method is used by the Modbus protocol?

It uses OSI Layer 2 and the primary device sends data based on request from secondary device.

It uses OSI Layer 2 and both the primary/secondary devices always send data during the communication.

It uses OSI Layer 2 and both the primary/secondary devices send data based on a matching token ring.

It uses OSI Layer 2 and the secondary device sends data based on request from primary device.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The OT network analyst runs different level of reports to quickly explore threats that exploit the network. Such reports can be run on all routers, switches, and firewalls. Which FortiSIEM reporting method helps to identify these type of exploits of image firmware files?

CMDB reports

Threat hunting reports

Compliance reports

OT/loT reports

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?