Which three criteria can a FortiGate device use to look for a matching firewall policy to process traffic? (Choose three.)
Which three criteria can a FortiGate device use to look for a matching firewall policy to process traffic? (Choose three.)A . Services defined in the firewall policy.B . Source defined as internet services in the firewall policyC . Lowest to highest policy ID numberD . Destination defined as internet services...
In a wireless network integration, how does FortiNAC obtain connecting MAC address information?
In a wireless network integration, how does FortiNAC obtain connecting MAC address information?A . RADIUSB . Link trapsC . End station traffic monitoringD . MAC notification trapsView AnswerAnswer: A Explanation: FortiNAC can integrate with RADIUS servers to obtain MAC address information for wireless clients that authenticate through the RADIUS server....
How do you view information presented in the exhibit and what does the FortiGate device security status tell you?
Refer to the exhibit. You are navigating through FortiSIEM in an OT network. How do you view information presented in the exhibit and what does the FortiGate device security status tell you?A . In the PCI logging dashboard and there are one or more high-severity security incidents for the FortiGate...
What should the OT supervisor do to achieve this on FortiGate?
An OT supervisor has configured LDAP and FSSO for the authentication. The goal is that all the users be authenticated against passive authentication first and, if passive authentication is not successful, then users should be challenged with active authentication. What should the OT supervisor do to achieve this on FortiGate?A...
Which three common breach points can be found in a typical OT environment? (Choose three.)
Which three common breach points can be found in a typical OT environment? (Choose three.)A . Global hatB . Hard hatC . VLAN exploitsD . Black hatE . RTU exploitsView AnswerAnswer: C, D, E
Which statement about the topology is true?
Refer to the exhibit In the topology shown in the exhibit, both PLCs can communicate directly with each other, without going through the firewall. Which statement about the topology is true?A . PLCs use IEEE802.1Q protocol to communicate each other.B . An administrator can create firewall policies in the switch...
Which three methods of communication are used by FortiNAC to gather visibility information? (Choose three.)
Which three methods of communication are used by FortiNAC to gather visibility information? (Choose three.)A . SNMPB . ICMPC . APID . RADIUSE . TACACSView AnswerAnswer: A, C, D
What are two benefits of a Nozomi integration with FortiNAC? (Choose two.)
What are two benefits of a Nozomi integration with FortiNAC? (Choose two.)A . Enhanced point of connection detailsB . Direct VLAN assignmentC . Adapter consolidation for multi-adapter hostsD . Importation and classification of hostsView AnswerAnswer: C, D Explanation: The two benefits of a Nozomi integration with FortiNAC are enhanced point...
Which three steps should an administrator take to protect the OT network?
Refer to the exhibit, which shows a non-protected OT environment. An administrator needs to implement proper protection on the OT network. Which three steps should an administrator take to protect the OT network? (Choose three.)A . Deploy an edge FortiGate between the internet and an OT network as a one-arm...
Based on the report results, which report was run?
Refer to the exhibit. An OT administrator ran a report to identify device inventory in an OT network. Based on the report results, which report was run?A . A FortiSIEM CMDB reportB . A FortiAnalyzer device reportC . A FortiSIEM incident reportD . A FortiSIEM analytics reportView AnswerAnswer: A