Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Fortinet NSE6_OTS_AR-7.6 Dumps Questions Answers

Fortinet NSE 6 - OT Security 7.6 Architect Questions and Answers

Question 1

Refer to the exhibit.

The Core Network Security Connectors page of the FortiGate-2 device is shown. Which statement is correct? (Choose one answer)

Options:

A.

FortiGate-2 serves as Fabric Root.

B.

You must enable Security Fabric Connection on the FortiGate-2 interface.

C.

You must configure the FortiAnalyzer settings on FortiGate-2.

D.

FortiGate-2 is not authorized on the root FortiGate.

Buy Now
Question 2

Refer to the exhibits.

The Playbook Monitor dashboard and the analysis of the corresponding incident analysis are shown. You created the playbook with the objective of automatically attaching the report to the incident that was created. Which two statements are correct? (Choose two answers)

Options:

A.

You must wait for the report to be generated and attached to the incident.

B.

Only the Create_Incident task was executed.

C.

The tasks in the playbook must be reordered.

D.

The playbook was triggered manually.

Question 3

Refer to the exhibit.

A partial OT network is shown. You want to provide the supervisor with secure remote access. Which two features can you implement on Edge-FortiGate ? (Choose two answers)

Options:

A.

IPsec

B.

FortiToken

C.

SD-WAN

D.

FSSO

Question 4

Refer to the exhibit.

Why is the OT View tab not available in the Asset Identity Center section of the FortiGate-1 device? (Choose one answer)

Options:

A.

You must enable the Purdue Levels feature on the FortiGate-1 device. B. Device Detection is not enabled on the FortiGate-1 interface. C. The OT View tab is only available on the root FortiGate. D. You must enable Security Fabric Connection on the interfaces of the FortiGate-1 device.

Question 5

In the Purdue model, at which level are physical assets like the Industrial Internet of Things (IIoT) placed? (Choose one answer)

Options:

A.

At Level 5 only

B.

At Level 1 only

C.

Above Level 4

D.

Below Level 3.5

Question 6

According to the IEC 62443 standard, your security level is 4 . What is your OT environment defending against? (Choose one answer)

Options:

A.

Intentional cyberthreats posed by skilled malicious users

B.

An intentional attack with low resources

C.

A syndicate of cyber extortion with extensive resources

D.

A casual exposure

Question 7

Refer to the exhibit.

An industrial Ethernet protocol skipping layers 3 to 6 is shown. Which industrial Ethernet protocol is it? (Choose one answer)

Options:

A.

POWERLINK

B.

Ethernet over industrial protocol

C.

Modbus

D.

EtherCAT

Question 8

Which industrial protocol does not support VLANs? (Choose one answer)

Options:

A.

[Not clearly visible in the exhibit]

B.

Ethernet over industrial protocol

C.

EtherCAT

D.

Modbus over TCP

Question 9

Refer to the exhibit.

A Virtual Patching profile is shown. You have recently updated your SCADA system and would like to apply the SCADA virtual patching profile. Which two statements about this profile are correct? (Choose two answers)

Options:

A.

Only the vulnerability Schneider.Electric.ClearSCADA.HTTP.Interface.XSS is still present.

B.

Low severity signatures are not blocked for the device with the MAC address 12:12:12:12:12.

C.

This profile blocks critical severity signatures for all the devices.

D.

The device with the MAC address 11:11:11:11:11 is considered to have no vulnerabilities.

Question 10

For the installation of your first FortiGate device, you want to minimize the impact in your OT network. Therefore, you deploy it initially as an offline IDS. Which two statements about this deployment are correct? (Choose two answers)

Options:

A.

The FortiGate device acts as a network sensor.

B.

The cybersecurity visibility increases with the security profiles.

C.

Attacks, including zero-day attacks, are blocked.

D.

OT traffic flows through the FortiGate device.