NSE7 OTS Correct Answers Only
NSE7 OTS Correct Answers Only
NSE7 OTS Correct Answers Only
NSE7_OTS-6.4 Exam
Fortinet NSE 7 - OT Security 6.4
Question 1:
What are two benefits of a Nozomi integration with FortiNAC? (Choose two.)
Question 2:
Which three criteria can a FortiGate device use to look for a matching firewall policy to process
traffic? (Choose three.)
Question 3:
Question 4:
Which three Fortinet products can be used for device identification in an OT industrial control
system (ICS)? (Choose three.)
• FortiNAC
• FortiSIEM
• FortiGate
Question 5:
In the topology shown in the exhibit, both PLCs can communicate directly with each other,
without going through the firewall. Which statement about the topology is true?
In a wireless network integration, how does FortiNAC obtain connecting MAC address
information?
• RADIUS
Question 7:
Which three common breach points can be found in a typical OT environment? (Choose three.)
• Hard hat
• Black hat
• RTU exploits
Question 8:
You are navigating through FortiSIEM in an OT network. How do you view information presented
in the exhibit and what does the FortiGate device security status tell you?
In the summary dashboard and there are one or more high-severity security incidents for the
FortiGate device
Question 9:
Question 11:
An OT administrator deployed many devices to secure the OT network. However, the SOC team is
reporting that there are too many alerts, and that many of the alerts are false positive. The OT
Questions & Answers PDF P-7 https://www.Pass4Future.com administrator would like to find a
solution that eliminates repetitive tasks, improves efficiency, saves time, and saves resources.
Which products should the administrator deploy to address these issues and automate most of
the manual tasks done by the SOC team?
You need to configure VPN user access for supervisors at the breach and HQ sites using the same
soft FortiToken. Each site has a FortiGate VPN gateway. What must you do to achieve this
objective?
Question 13:
An OT supervisor has configured LDAP and FSSO for the authentication. The goal is that all the
users be authenticated against passive authentication first and, if passive authentication is not
successful, then users should be challenged with active authentication. What should the OT
supervisor do to achieve this on FortiGate?
• Configure a firewall policy with FSSO users and place it on the top of list of firewall policies
Question 14:
An OT network architect needs to secure control area zones with a single network access policy to
provision devices to any number of different networks. On which device can this be accomplished?
• FortiNAC
Question 15:
Based on the topology designed by the OT architect, which two statements about implementing
OT security are true? (Choose two.)
Question 16:
Which three methods of communication are used by FortiNAC to gather visibility information?
(Choose three.)
• SNMP
• API
• RADIUS
Question 17:
An OT architect has deployed a Layer 2 switch in the OT network at Level 1 the Purdue model-
process control. The purpose of the Layer 2 switch is to segment traffic between PLC1 and PLC2
with two VLANs. All the traffic between PLC1 and PLC2 must first flow through the Layer 2 switch
and then through the FortiGate device in the Level 2 supervisory control network. What statement
about the traffic between PLC1 and PLC2 is true?
• PLC1 and PLC2 traffic must flow through the Layer-2 switch trunk link to the FortiGate device
Question 18:
An OT administrator is defining an incident notification policy using FortiSIEM and would like to
configure the system with a notification policy. If an incident occurs, the administrator would like
to be able to intervene and block an IP address or disable a user in Active Directory from
FortiSIEM. Which step must the administrator take to achieve this task?
Question 19:
When you create a user or host profile, which three criteria can you use? (Choose three.)
An administrator needs to implement proper protection on the OT network. Which three steps
should an administrator take to protect the OT network? (Choose three.)
• Deploy an edge FortiGate between the internet and an OT network as a one-arm sniffer
• Configure firewall policies with industrial protocol sensors
• Use segmentation
Question 21:
An OT administrator has configured FSSO and local firewall authentication. A user who is part of a
user group is not prompted from credentials during authentication. What is a possible reason?
Question 23:
An administrator wants to use FortiSoC and SOAR features on a FortiAnalyzer device to detect and
block any unauthorized access to FortiGate devices in an OT network. Which two statements
about FortiSoC and SOAR features on FortiAnalyzer are true? (Choose two.)
Question 24:
You are investigating a series of incidents that occurred in the OT network over past 24 hours in
FortiSIEM. Which three FortiSIEM options can you use to investigate these incidents? (Choose
three.)
• List
• Risk
• Overview
Question 25:
Question 26:
When device profiling rules are enabled, which devices connected on the network are evaluated
by the device profiling rules?
• Rogue devices, only when they connect for the first time
Question 27:
What two advantages does FortiNAC provide in the OT network? (Choose two.)
Question 28:
An OT administrator configured and ran a default application risk and control report in
FortiAnalyzer to learn more about the key application crossing the network. However, the report
output is empty despite the fact that some related real-time and historical logs are visible in the
FortiAnalyzer.
What are two possible reasons why the report output was empty? (Choose two.)
• The administrator selected the wrong time period for the report
• The administrator selected the wrong hcache table for the report.
Question 30:
Question 31:
Based on the Purdue model, which three measures can be implemented in the control area zone
using the Fortinet Security Fabric? (Choose three.)
Question 32:
• Profiling rules
Question 33:
• It uses OSI Layer 2 and the secondary device sends data based on request from primary
device
Question 34:
An OT architect has implemented a Modbus TCP with a simulation server Conpot to identify and
control the Modus traffic in the OT network. The FortiGate-Edge device is configured with a
software switch interface ssw-01. Based on the topology shown in the exhibit, which two
statements about the successful simulation of traffic between client and server are true? (Choose
two.)
Question 35:
An OT network architect must deploy a solution to protect fuel pumps in an industrial remote
network. All the fuel pumps must be closely monitored from the corporate network for any
temperature fluctuations. How can the OT network architect achieve this goal?
• Configure a fuel server on the corporate network, and deploy a FortiSIEM with a single
pattern temperature performance rule on the remote network.