Which three criteria can a FortiGate device use to look for a matching firewall policy to process traffic? (Choose three.)

Which three criteria can a FortiGate device use to look for a matching firewall policy to process traffic? (Choose three.)A . Services defined in the firewall policy.B . Source defined as internet services in the firewall policyC . Lowest to highest policy ID numberD . Destination defined as internet services...

September 26, 2024 No Comments READ MORE +

In a wireless network integration, how does FortiNAC obtain connecting MAC address information?

In a wireless network integration, how does FortiNAC obtain connecting MAC address information?A . RADIUSB . Link trapsC . End station traffic monitoringD . MAC notification trapsView AnswerAnswer: A Explanation: FortiNAC can integrate with RADIUS servers to obtain MAC address information for wireless clients that authenticate through the RADIUS server....

September 24, 2024 No Comments READ MORE +

How do you view information presented in the exhibit and what does the FortiGate device security status tell you?

Refer to the exhibit. You are navigating through FortiSIEM in an OT network. How do you view information presented in the exhibit and what does the FortiGate device security status tell you?A . In the PCI logging dashboard and there are one or more high-severity security incidents for the FortiGate...

September 23, 2024 No Comments READ MORE +

What should the OT supervisor do to achieve this on FortiGate?

An OT supervisor has configured LDAP and FSSO for the authentication. The goal is that all the users be authenticated against passive authentication first and, if passive authentication is not successful, then users should be challenged with active authentication. What should the OT supervisor do to achieve this on FortiGate?A...

September 23, 2024 No Comments READ MORE +

Which three common breach points can be found in a typical OT environment? (Choose three.)

Which three common breach points can be found in a typical OT environment? (Choose three.)A . Global hatB . Hard hatC . VLAN exploitsD . Black hatE . RTU exploitsView AnswerAnswer: C, D, E

September 22, 2024 No Comments READ MORE +

Which statement about the topology is true?

Refer to the exhibit In the topology shown in the exhibit, both PLCs can communicate directly with each other, without going through the firewall. Which statement about the topology is true?A . PLCs use IEEE802.1Q protocol to communicate each other.B . An administrator can create firewall policies in the switch...

September 21, 2024 No Comments READ MORE +

Which three methods of communication are used by FortiNAC to gather visibility information? (Choose three.)

Which three methods of communication are used by FortiNAC to gather visibility information? (Choose three.)A . SNMPB . ICMPC . APID . RADIUSE . TACACSView AnswerAnswer: A, C, D

September 20, 2024 No Comments READ MORE +

What are two benefits of a Nozomi integration with FortiNAC? (Choose two.)

What are two benefits of a Nozomi integration with FortiNAC? (Choose two.)A . Enhanced point of connection detailsB . Direct VLAN assignmentC . Adapter consolidation for multi-adapter hostsD . Importation and classification of hostsView AnswerAnswer: C, D Explanation: The two benefits of a Nozomi integration with FortiNAC are enhanced point...

September 19, 2024 No Comments READ MORE +

Which three steps should an administrator take to protect the OT network?

Refer to the exhibit, which shows a non-protected OT environment. An administrator needs to implement proper protection on the OT network. Which three steps should an administrator take to protect the OT network? (Choose three.)A . Deploy an edge FortiGate between the internet and an OT network as a one-arm...

September 19, 2024 No Comments READ MORE +

Based on the report results, which report was run?

Refer to the exhibit. An OT administrator ran a report to identify device inventory in an OT network. Based on the report results, which report was run?A . A FortiSIEM CMDB reportB . A FortiAnalyzer device reportC . A FortiSIEM incident reportD . A FortiSIEM analytics reportView AnswerAnswer: A

September 12, 2024 No Comments READ MORE +