Exam Details

  • Exam Code
    :NSE7_OTS-6.4
  • Exam Name
    :Fortinet NSE 7 - OT Security 6.4
  • Certification
    :NSE 7 Network Security Architect
  • Vendor
    :Fortinet
  • Total Questions
    :35 Q&As
  • Last Updated
    :May 12, 2024

Fortinet NSE 7 Network Security Architect NSE7_OTS-6.4 Questions & Answers

  • Question 1:

    You are investigating a series of incidents that occurred in the OT network over past 24 hours in FortiSIEM.

    Which three FortiSIEM options can you use to investigate these incidents? (Choose three.)

    A. Security

    B. IPS

    C. List

    D. Risk

    E. Overview

  • Question 2:

    Refer to the exhibit.

    Which statement about the interfaces shown in the exhibit is true?

    A. port2, port2-vlan10, and port2-vlan1 are part of the software switch interface.

    B. The VLAN ID of port1-vlan1 can be changed to the VLAN ID 10.

    C. port1-vlan10 and port2-vlan10 are part of the same broadcast domain

    D. port1, port1-vlan10, and port1-vlan1 are in different broadcast domains

  • Question 3:

    When device profiling rules are enabled, which devices connected on the network are evaluated by the device profiling rules?

    A. Known trusted devices, each time they change location

    B. All connected devices, each time they connect

    C. Rogue devices, only when they connect for the first time

    D. Rogue devices, each time they connect

  • Question 4:

    What two advantages does FortiNAC provide in the OT network? (Choose two.)

    A. It can be used for IoT device detection.

    B. It can be used for industrial intrusion detection and prevention.

    C. It can be used for network micro-segmentation.

    D. It can be used for device profiling.

  • Question 5:

    What triggers Layer 2 polling of infrastructure devices connected in the network?

    A. A failed Layer 3 poll

    B. A matched security policy

    C. A matched profiling rule

    D. A linkup or linkdown trap

  • Question 6:

    An OT administrator configured and ran a default application risk and control report in FortiAnalyzer to learn more about the key application crossing the network. However, the report output is empty despite the fact that some related real-time and historical logs are visible in the FortiAnalyzer.

    What are two possible reasons why the report output was empty? (Choose two.)

    A. The administrator selected the wrong logs to be indexed in FortiAnalyzer.

    B. The administrator selected the wrong time period for the report.

    C. The administrator selected the wrong devices in the Devices section.

    D. The administrator selected the wrong hcache table for the report.

  • Question 7:

    An OT supervisor needs to protect their network by implementing security with an industrial signature database on the FortiGate device.

    Which statement about the industrial signature database on FortiGate is true?

    A. A supervisor must purchase an industrial signature database and import it to the FortiGate.

    B. An administrator must create their own database using custom signatures.

    C. By default, the industrial database is enabled.

    D. A supervisor can enable it through the FortiGate CLI.

  • Question 8:

    Refer to the exhibit.

    Based on the Purdue model, which three measures can be implemented in the control area zone using the Fortinet Security Fabric? (Choose three.)

    A. FortiGate for SD-WAN

    B. FortiGate for application control and IPS

    C. FortiNAC for network access control

    D. FortiSIEM for security incident and event management

    E. FortiEDR for endpoint detection

  • Question 9:

    What can be assigned using network access control policies?

    A. Layer 3 polling intervals

    B. FortiNAC device polling methods

    C. Logical networks

    D. Profiling rules

  • Question 10:

    As an OT administrator, it is important to understand how industrial protocols work in an OT network. Which communication method is used by the Modbus protocol?

    A. It uses OSI Layer 2 and the primary device sends data based on request from secondary device.

    B. It uses OSI Layer 2 and both the primary/secondary devices always send data during the communication.

    C. It uses OSI Layer 2 and both the primary/secondary devices send data based on a matching token ring.

    D. It uses OSI Layer 2 and the secondary device sends data based on request from primary device.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Fortinet exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your NSE7_OTS-6.4 exam preparations and Fortinet certification application, do not hesitate to visit our Vcedump.com to find your solutions here.