Prepare NSE7_OTS-7.2 Exam with Using NSE7_OTS-7.2 Dump Questions



Post Date:

If you are serious about passing your Fortinet NSE7_OTS-7.2 certification exam, practicing with NSE7_OTS-7.2 dumps questions is an essential step in your preparation process. These NSE7_OTS-7.2 dumps will help you assess your knowledge, identify your strengths and weaknesses, and improve your chances of passing the exam on the first try. So why wait? Start practicing today and give yourself the best possible chance of success! Test free NSE7_OTS-7.2 exam dumps questions below.

Page 1 of 2

1. Which three Fortinet products can be used for device identification in an OT industrial control system (ICS)? (Choose three.)

A. FortiNAC

B. FortiManager

C. FortiAnalyzer

D. FortiSIEM

E. FortiGate

2. Which type of attack posed by skilled and malicious users of security level 4 (SL 4) of IEC 62443 is designed to defend against intentional attacks?

3. An OT administrator deployed many devices to secure the OT network. However, the SOC team is reporting that there are too many alerts, and that many of the alerts are false positive. The OT administrator would like to find a solution that eliminates repetitive tasks, improves efficiency, saves time, and saves resources.

Which products should the administrator deploy to address these issues and automate most of the manual tasks done by the SOC team?

4. What are two critical tasks the OT network auditors must perform during OT network risk assessment and management? (Choose two.)

5. You are investigating a series of incidents that occurred in the OT network over past 24 hours in FortiSIEM.

Which three FortiSIEM options can you use to investigate these incidents? (Choose three.)

6. Which three criteria can a FortiGate device use to look for a matching firewall policy to process traffic? (Choose three.)

A. Services defined in the firewall policy.

B. Source defined as internet services in the firewall policy

C. Lowest to highest policy ID number

D. Destination defined as internet services in the firewall policy

E. Highest to lowest priority defined in the firewall policy

7. An OT network consists of multiple FortiGate devices. The edge FortiGate device is deployed as the secure gateway and is only allowing remote operators to access the ICS networks on site.

Management hires a third-party company to conduct health and safety on site. The third-party company must have outbound access to external resources.

As the OT network administrator, what is the best scenario to provide external access to the third-party company while continuing to secure the ICS networks?

8. Refer to the exhibit

In the topology shown in the exhibit, both PLCs can communicate directly with each other, without going through the firewall.

Which statement about the topology is true?

9. Which three methods of communication are used by FortiNAC to gather visibility information? (Choose three.)

10. Refer to the exhibit.

PLC-3 and CLIENT can send traffic to PLC-1 and PLC-2. FGT-2 has only one software switch (SSW-1) connecting both PLC-3 and CLIENT. PLC-3 and CLIENT can send traffic to each other at the Layer 2 level.

What must the OT admin do to prevent Layer 2-level communication between PLC-3 and CLIENT?



Notify of
Inline Feedbacks
View all comments