Free NSE7_OTS-7.2 Exam Braindumps (page: 6)

Page 5 of 16

An OT architect has deployed a Layer 2 switch in the OT network at Level 1 the Purdue model-process control. The purpose of the Layer 2 switch is to segment traffic between PLC1 and PLC2 with two VLANs. All the traffic between PLC1 and PLC2 must first flow through the Layer 2 switch and then through the FortiGate device in the Level 2 supervisory control network.
What statement about the traffic between PLC1 and PLC2 is true?

  1. The Layer 2 switch rewrites VLAN tags before sending traffic to the FortiGate device.
  2. The Layer 2 switches routes any traffic to the FortiGate device through an Ethernet link.
  3. PLC1 and PLC2 traffic must flow through the Layer-2 switch trunk link to the FortiGate device.
  4. In order to communicate, PLC1 must be in the same VLAN as PLC2.

Answer(s): C

Explanation:

The statement that is true about the traffic between PLC1 and PLC2 is that PLC1 and PLC2 traffic must flow through the Layer-2 switch trunk link to the FortiGate device.



An OT administrator is defining an incident notification policy using FortiSIEM and would like to configure the system with a notification policy. If an incident occurs, the administrator would like to be able to intervene and block an IP address or disable a user in Active Directory from FortiSIEM.
Which step must the administrator take to achieve this task?

  1. Configure a fabric connector with a notification policy on FortiSIEM to connect with FortiGate.
  2. Create a notification policy and define a script/remediation on FortiSIEM.
  3. Define a script/remediation on FortiManager and enable a notification rule on FortiSIEM.
  4. Deploy a mitigation script on Active Directory and create a notification policy on FortiSIEM.

Answer(s): B

Explanation:

https://fusecommunity.fortinet.com/blogs/silviu/2022/04/12/fortisiempublishingscript



When you create a user or host profile, which three criteria can you use? (Choose three.)

  1. Host or user group memberships
  2. Administrative group membership
  3. An existing access control policy
  4. Location
  5. Host or user attributes

Answer(s): A,D,E

Explanation:

https://docs.fortinet.com/document/fortinac/9.2.0/administration-guide/15797/user-host-profiles



Refer to the exhibit, which shows a non-protected OT environment.



An administrator needs to implement proper protection on the OT network.

Which three steps should an administrator take to protect the OT network? (Choose three.)

  1. Deploy an edge FortiGate between the internet and an OT network as a one-arm sniffer.
  2. Deploy a FortiGate device within each ICS network.
  3. Configure firewall policies with web filter to protect the different ICS networks.
  4. Configure firewall policies with industrial protocol sensors
  5. Use segmentation

Answer(s): A,C,D






Post your Comments and Discuss Fortinet NSE7_OTS-7.2 exam with other Community members:

NSE7_OTS-7.2 Discussions & Posts