When you create a user or host profile, which three criteria can you use? (Choose three.)
When you create a user or host profile, which three criteria can you use? (Choose three.)A . Host or user group membershipsB . Administrative group membershipC . An existing access control policyD . LocationE . Host or user attributesView AnswerAnswer: A, D, E Explanation: https://docs.fortinet.com/document/fortinac/9.2.0/administration-guide/15797/user-host-profiles
Which two methods should the administrator use to achieve this?
An OT network administrator is trying to implement active authentication. Which two methods should the administrator use to achieve this? (Choose two.)A . Two-factor authentication on FortiAuthenticatorB . Role-based authentication on FortiNACC . FSSO authentication on FortiGateD . Local authentication on FortiGateView AnswerAnswer: A, D
On which device can this be accomplished?
An OT network architect needs to secure control area zones with a single network access policy to provision devices to any number of different networks. On which device can this be accomplished?A . FortiGateB . FortiEDRC . FortiSwitchD . FortiNACView AnswerAnswer: D Explanation: An OT network architect can accomplish the...
Which three Fortinet products can be used for device identification in an OT industrial control system (ICS)? (Choose three.)
Which three Fortinet products can be used for device identification in an OT industrial control system (ICS)? (Choose three.)A . FortiNACB . FortiManagerC . FortiAnalyzerD . FortiSIEME . FortiGateView AnswerAnswer: ADE Explanation: A) FortiNAC - FortiNAC is a network access control solution that provides visibility and control over network devices....
Which statement about the output is true?
Refer to the exhibit and analyze the output. Which statement about the output is true?A . This is a sample of a FortiAnalyzer system interface event log.B . This is a sample of an SNMP temperature control event log.C . This is a sample of a PAM event type.D ....
What must you do to achieve this objective?
Refer to the exhibit. You need to configure VPN user access for supervisors at the breach and HQ sites using the same soft FortiToken. Each site has a FortiGate VPN gateway. What must you do to achieve this objective?A . You must use a FortiAuthenticator.B . You must register the...
Based on the topology designed by the OT architect, which two statements about implementing OT security are true?
Refer to the exhibit. Based on the topology designed by the OT architect, which two statements about implementing OT security are true? (Choose two.)A . Firewall policies should be configured on FortiGate-3 and FortiGate-4 with industrial protocol sensors.B . Micro-segmentation can be achieved only by replacing FortiGate-3 and FortiGate-4 with...
Which step must the administrator take to achieve this task?
An OT administrator is defining an incident notification policy using FortiSIEM and would like to configure the system with a notification policy. If an incident occurs, the administrator would like to be able to intervene and block an IP address or disable a user in Active Directory from FortiSIEM. Which...
Which products should the administrator deploy to address these issues and automate most of the manual tasks done by the SOC team?
An OT administrator deployed many devices to secure the OT network. However, the SOC team is reporting that there are too many alerts, and that many of the alerts are false positive. The OT administrator would like to find a solution that eliminates repetitive tasks, improves efficiency, saves time, and...
What statement about the traffic between PLC1 and PLC2 is true?
An OT architect has deployed a Layer 2 switch in the OT network at Level 1 the Purdue model-process control. The purpose of the Layer 2 switch is to segment traffic between PLC1 and PLC2 with two VLANs. All the traffic between PLC1 and PLC2 must first flow through the...