Question 6 of 35

In a wireless network integration, how does FortiNAC obtain connecting MAC address information?
Answer

Suggested Answer

The suggested answer is D.

In a wireless network integration, FortiNAC obtains connecting MAC address information using MAC notification traps. This method allows the system to receive updates whenever a new device connects to the network, ensuring accurate and up-to-date information about connected devices.

Community Votes3 votes
AMost voted
100%
Question 7 of 35

Which three common breach points can be found in a typical OT environment? (Choose three.)
Answer

Suggested Answer

The suggested answer is B, D, E.

In a typical Operational Technology (OT) environment, common breach points include black hat activities which involve malicious attackers, hard hat incidents that involve physical security breaches by insiders or on-site personnel, and RTU (Remote Terminal Unit) exploits which are vulnerabilities in critical field devices used for automating industrial processes.

Community Votes8 votes
BDESuggested
100%
Question 8 of 35

Refer to the exhibit.
Exam NSE7_OTS-6.4: Question 8 - Image 1
You are navigating through FortiSIEM in an OT network.
How do you view information presented in the exhibit and what does the FortiGate device security status tell you?
Answer

Suggested Answer

The suggested answer is B.

The exhibit presents a status overview of various network devices. The security status icon of the FortiGate device shows a red cross, indicating one or more high-severity security incidents. This information is typically viewed in the summary dashboard, which provides a consolidated view of device statuses, including security alerts.

Community Votes2 votes
BSuggested
100%
Question 9 of 35

An OT network administrator is trying to implement active authentication.
Which two methods should the administrator use to achieve this? (Choose two.)
Answer

Suggested Answer

The suggested answer is A, D.

To implement active authentication, an OT network administrator should use two-factor authentication on FortiAuthenticator and local authentication on FortiGate. Two-factor authentication is a robust method that involves verifying user identity through two separate channels or forms of credentials, making it an active form of authentication. Local authentication on FortiGate also qualifies as active authentication because it requires users to actively enter credentials verified against locally stored databases.

Community Votes10 votes
ADSuggested
100%
Question 10 of 35

Refer to the exhibit.
Exam NSE7_OTS-6.4: Question 10 - Image 1
An OT administrator ran a report to identify device inventory in an OT network.
Based on the report results, which report was run?
Answer

Suggested Answer

The suggested answer is A.

Based on the report details, it displays the device name, vendor, model, hardware model, and the device image file, all relevant to an inventory of devices. This comprehensive information aligns well with what a FortiSIEM CMDB (Configuration Management Database) report would provide. Such a report is specifically designed to capture detailed information about devices in the network, making option A the correct answer.

Community Votes5 votes
ASuggested
100%