Free NSE7_OTS-6.4 Exam Braindumps

Pass your Fortinet NSE 7 - OT Security 6.4 exam with these free Questions and Answers

Page 3 of 7
QUESTION 6

An OT supervisor has configured LDAP and FSSO for the authentication. The goal is that all the users be authenticated against passive authentication first and, if passive authentication is not successful, then users should be challenged with active authentication.
What should the OT supervisor do to achieve this on FortiGate?

  1. A. Configure a firewall policy with LDAP users and place it on the top of list of firewall policies.
  2. B. Enable two-factor authentication with FSSO.
  3. C. Configure a firewall policy with FSSO users and place it on the top of list of firewall policies.
  4. D. Under config user settings configure set auth-on-demand implicit.

Correct Answer: D

QUESTION 7

Refer to the exhibit.
NSE7_OTS-6.4 dumps exhibit
Which statement about the interfaces shown in the exhibit is true?

  1. A. port2, port2-vlan10, and port2-vlan1 are part of the software switch interface.
  2. B. The VLAN ID of port1-vlan1 can be changed to the VLAN ID 10.
  3. C. port1-vlan10 and port2-vlan10 are part of the same broadcast domain
  4. D. port1, port1-vlan10, and port1-vlan1 are in different broadcast domains

Correct Answer: D

QUESTION 8

Refer to the exhibit.
NSE7_OTS-6.4 dumps exhibit
Based on the topology designed by the OT architect, which two statements about implementing OT security are true? (Choose two.)

  1. A. Firewall policies should be configured on FortiGate-3 and FortiGate-4 with industrial protocol sensors.
  2. B. Micro-segmentation can be achieved only by replacing FortiGate-3 and FortiGate-4 with a pair ofFortiSwitch devices.
  3. C. IT and OT networks are separated by segmentation.
  4. D. FortiGate-3 and FortiGate-4 devices must be in a transparent mode.

Correct Answer: CD

QUESTION 9

As an OT administrator, it is important to understand how industrial protocols work in an OT network. Which communication method is used by the Modbus protocol?

  1. A. It uses OSI Layer 2 and the primary device sends data based on request from secondary device.
  2. B. It uses OSI Layer 2 and both the primary/secondary devices always send data during the communication.
  3. C. It uses OSI Layer 2 and both the primary/secondary devices send data based on a matching token ring.
  4. D. It uses OSI Layer 2 and the secondary device sends data based on request from primary device.

Correct Answer: D

QUESTION 10

You are investigating a series of incidents that occurred in the OT network over past 24 hours in FortiSIEM. Which three FortiSIEM options can you use to investigate these incidents? (Choose three.)

  1. A. Security
  2. B. IPS
  3. C. List
  4. D. Risk
  5. E. Overview

Correct Answer: CDE

Page 3 of 7

Post your Comments and Discuss Fortinet NSE7_OTS-6.4 exam with other Community members: