Questions for the NSE7-OTS-6-4 were updated on : Jan 11 ,2025
What are two benefits of a Nozomi integration with FortiNAC? (Choose two.)
A, B
Which three criteria can a FortiGate device use to look for a matching firewall policy to process
traffic? (Choose three.)
A, B, D
Refer to the exhibit and analyze the output.
Which statement about the output is true?
A
Which three Fortinet products can be used for device identification in an OT industrial control system
(ICS)? (Choose three.)
A, C, D
Refer to the exhibit
In the topology shown in the exhibit, both PLCs can communicate directly with each other, without
going through the firewall.
Which statement about the topology is true?
D
In a wireless network integration, how does FortiNAC obtain connecting MAC address information?
A
Which three common breach points can be found in a typical OT environment? (Choose three.)
C, D, E
Refer to the exhibit.
You are navigating through FortiSIEM in an OT network.
How do you view information presented in the exhibit and what does the FortiGate device security
status tell you?
B
An OT network administrator is trying to implement active authentication.
Which two methods should the administrator use to achieve this? (Choose two.)
A, B
Refer to the exhibit.
An OT administrator ran a report to identify device inventory in an OT network.
Based on the report results, which report was run?
A
An OT administrator deployed many devices to secure the OT network. However, the SOC team is
reporting that there are too many alerts, and that many of the alerts are false positive. The OT
administrator would like to find a solution that eliminates repetitive tasks, improves efficiency, saves
time, and saves resources.
Which products should the administrator deploy to address these issues and automate most of the
manual tasks done by the SOC team?
C
Refer to the exhibit.
You need to configure VPN user access for supervisors at the breach and HQ sites using the same soft
FortiToken. Each site has a FortiGate VPN gateway.
What must you do to achieve this objective?
A
An OT supervisor has configured LDAP and FSSO for the authentication. The goal is that all the users
be authenticated against passive authentication first and, if passive authentication is not successful,
then users should be challenged with active authentication.
What should the OT supervisor do to achieve this on FortiGate?
D
An OT network architect needs to secure control area zones with a single network access policy to
provision devices to any number of different networks.
On which device can this be accomplished?
D
Refer to the exhibit.
Based on the topology designed by the OT architect, which two statements about implementing OT
security are true? (Choose two.)
C, D