Fortinet NSE7_OTS-7.2 - Fortinet NSE 7 - OT Security 7.2
When device profiling rules are enabled, which devices connected on the network are evaluated by the device profiling rules?
In a wireless network integration, how does FortiNAC obtain connecting MAC address information?
Which type of attack posed by skilled and malicious users of security level 4 (SL 4) of IEC 62443 is designed to defend against intentional attacks?
What is the primary objective of implementing SD-WAN in operational technology (OT) networks'?
As an OT network administrator, you are managing three FortiGate devices that each protect different levels on the Purdue model. To increase traffic visibility, you are required to implement additional security measures to detect exploits that affect PLCs.
Which security sensor must implement to detect these types of industrial exploits?
Which three common breach points can you find in a typical OT environment? (Choose three.)
Refer to the exhibit.
Given the configurations on the FortiGate, which statement is true?
Refer to the exhibit, which shows a non-protected OT environment.
An administrator needs to implement proper protection on the OT network.
Which three steps should an administrator take to protect the OT network? (Choose three.)
Which three criteria can a FortiGate device use to look for a matching firewall policy to process traffic? (Choose three.)
Which three common breach points can be found in a typical OT environment? (Choose three.)