Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Fortinet NSE6_OTS_AR-7.6 Dumps

Fortinet NSE 6 - OT Security 7.6 Architect Questions and Answers

Question 1

For the installation of your first FortiGate device, you want to minimize the impact in your OT network. Therefore, you deploy it initially as an offline IDS. Which two statements about this deployment are correct? (Choose two answers)

Options:

A.

The FortiGate device acts as a network sensor.

B.

The cybersecurity visibility increases with the security profiles.

C.

Attacks, including zero-day attacks, are blocked.

D.

OT traffic flows through the FortiGate device.

Question 2

Refer to the exhibit.

as

The OT devices behind the ruggedized FortiGate have vulnerabilities and you want to apply a virtual patching profile in the firewall policy. Why is Virtual Patching not available in the Security Profiles section? (Choose one answer)

Options:

A.

You must enable Virtual Patching in the Feature Visibility section.

B.

You must have a ruggedized FortiGate allowing the virtual patching feature.

C.

You must enable OT signatures.

D.

You must have a valid OT security service license.

Question 3

Refer to the exhibits.

as

A partial Basic Event Handler page on FortiAnalyzer and the creation of a trigger in a FortiGate device are shown. To improve the protection of your OT network, you want to automate the handling of compromised devices notified through FortiAnalyzer. You have configured an event handler named Alert_trigger as shown in the exhibit. When you create the trigger on the FortiGate device, the Event handler name field does not provide the Alert_trigger option. What two actions must you perform to make the Alert_trigger option available? (Choose two answers)

Options:

A.

You must click + Create in the Event handler name field.

B.

You must authorize the FortiGate device on FortiAnalyzer.

C.

You must configure the FortiAnalyzer setting on the FortiGate device.

D.

You must configure the trigger on the root FortiGate.

Question 4

You want to protect OT devices that are not updated against known vulnerabilities so you apply virtual patching to the firewall policies. What must you check to confirm that the OT devices are virtually patched? (Choose one answer)

Options:

A.

The output of the CLI command get virtual-patch profile

B.

The OT View page

C.

The output of the CLI command get rule otvp status

D.

The Asset Identity List page

Question 5

Refer to the exhibits.

as

A partial view of the Playbook Monitor page and the corresponding playbook configuration are shown. Based on the monitor page and the configuration of the playbook, what has triggered the Run_Report task? (Choose one answer)

Options:

A.

An IPS_Attack_Handling event

B.

An IPS incident creation

C.

An Event_Trigger log

D.

An IPS_Attack_Incident log

Question 6

Refer to the exhibit.

as

A simplified OT network is shown. You want to optimize the protection of this OT network. Which two controls must you implement? (Choose two answers)

Options:

A.

Offline IDS on FortiGate_Level3.

B.

IPS on FortiGate_Level5.

C.

Virtual patching on FortiGate_Level2.

D.

OT signature on FortiGate_Level5.

Question 7

Refer to the exhibit. A partial OT network is shown. You must improve the security of this OT network and implement internal segmentation between network 1 and network 2. How can you achieve the segmentation? (Choose one answer)

as

Options:

A.

You can configure universal ZTNA.

B.

You can configure one traffic VDOM.

C.

You can configure an explicit software switch.

D.

You can configure forward domain IDs for each network.

Question 8

Which industrial protocol does not support VLANs? (Choose one answer)

Options:

A.

[Not clearly visible in the exhibit]

B.

Ethernet over industrial protocol

C.

EtherCAT

D.

Modbus over TCP

Question 9

Refer to the exhibit.

as

Which statement about this partial Asset Identity List page is correct? (Choose one answer)

Options:

A.

A firewall policy has an Antivirus security profile applied to it.

B.

A firewall policy has a Virtual Patching security profile applied to it.

C.

A firewall policy has an Intrusion Prevention security profile applied to it.

D.

A firewall policy has an Application Control security profile applied to it.

Question 10

During layer 2 polling , which two pieces of information are gathered by FortiNAC to identify a device? (Choose two answers)

Options:

A.

Where it was learned

B.

The MAC-to-IP correlation learned

C.

The system name learned

D.

The time it was learned

Page: 1 / 4
Total 35 questions