Operational technology (OT) network analysts run different levels of reports to identify failures that
could put the network at risk Some of these reports may be related to device performance
Which FortiSIEM reporting method helps identify device failures?
C
Which three methods of communication are used by FortiNAC to gather visibility information?
(Choose three.)
A,C,D
Refer to the exhibit.
An operational technology rule is created and successfully activated to monitor the Modbus protocol
on FortiSIEM. However, the rule does not trigger incidents despite Modbus traffic and application
logs being received correctly by FortiSIEM.
Which statement correctly describes the issue on the rule configuration?
B
What can be assigned using network access control policies?
C
A FortiGate device is newly deployed as the edge gateway of an OT network security fabric. The
downstream FortiGate devices are also newly deployed as Security Fabric leafs to protect the control
area zone.
With no additional essential networking devices, and to implement micro-segmentation on this OT
network, what configuration must the OT network architect apply to control intra-VLAN traffic?
D
An OT network architect must deploy a solution to protect fuel pumps in an industrial remote
network. All the fuel pumps must be closely monitored from the corporate network for any
temperature fluctuations.
How can the OT network architect achieve this goal?
C
Explanation:
This way, FortiSIEM can discover and monitor everything attached to the remote network and
provide security visibility to the corporate network
Refer to the exhibit.
In order for a FortiGate device to act as router on a stick, what configuration must an OT network
architect implement on FortiGate to achieve inter-VLAN routing?
D
An OT administrator configured and ran a default application risk and control report in FortiAnalyzer
to learn more about the key application crossing the network. However, the report output is empty
despite the fact that some related real-time and historical logs are visible in the FortiAnalyzer.
What are two possible reasons why the report output was empty? (Choose two.)
B,C
Explanation:
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/32cb817d-a307-11eb-
b70b-00505692583a/FortiAnalyzer-7.0.0-Administration_Guide.pdf
The OT network analyst runs different level of reports to quickly explore threats that exploit the
network. Such reports can be run on all routers, switches, and firewalls. Which FortiSIEM reporting
method helps to identify these type of exploits of image firmware files?
A
In a wireless network integration, how does FortiNAC obtain connecting MAC address information?
A
Explanation:
FortiNAC can integrate with RADIUS servers to obtain MAC address information for wireless clients
that authenticate through the RADIUS server.
Reference:
Fortinet NSE 7 - OT Security 6.4 Study Guide, Chapter 4: OT Security Devices, page 4-28.
How can you achieve remote access and internet availability in an OT network?
B
What are two critical tasks the OT network auditors must perform during OT network risk assessment
and management? (Choose two.)
A,C
What is the primary objective of implementing SD-WAN in operational technology (OT) networks'?
C
Refer to the exhibit.
PLC-3 and CLIENT can send traffic to PLC-1 and PLC-2. FGT-2 has only one software switch (SSW-1)
connecting both PLC-3 and CLIENT. PLC-3 and CLIENT cannot send traffic to each other.
Which two statements about the traffic between PCL-1 and PLC-2 are true? (Choose two.)
B,D
An OT network consists of multiple FortiGate devices. The edge FortiGate device is deployed as the
secure gateway and is only allowing remote operators to access the ICS networks on site.
Management hires a third-party company to conduct health and safety on site. The third-party
company must have outbound access to external resources.
As the OT network administrator, what is the best scenario to provide external access to the third-
party company while continuing to secure the ICS networks?
C