Discount Offer
Go Back on NSE7_OTS-7.2 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

NSE7_OTS-7.2 Practice Test


Page 1 out of 13 Pages

An OT supervisor has configured LDAP and FSSO for the authentication. The goal is that all the users be authenticated against passive authentication first and, if passive authentication is not successful, then users should be challenged with active authentication. What should the OT supervisor do to achieve this on FortiGate?


A. Configure a firewall policy with LDAP users and place it on the top of list of firewall policies.


B. Enable two-factor authentication with FSSO.


C. Configure a firewall policy with FSSO users and place it on the top of list of firewall policies.


D. Under config user settings configure set auth-on-demand implicit.





C.
  Configure a firewall policy with FSSO users and place it on the top of list of firewall policies.

Explanation: The OT supervisor should configure a firewall policy with FSSO users and place it on the top of list of firewall policies in order to achieve the goal of authenticating users against passive authentication first and, if passive authentication is not successful, then challenging them with active authentication.

In a wireless network integration, how does FortiNAC obtain connecting MAC address information?


A. RADIUS


B. Link traps


C. End station traffic monitoring


D. MAC notification traps





A.
  RADIUS

Explanation: FortiNAC can integrate with RADIUS servers to obtain MAC address information for wireless clients that authenticate through the RADIUS server.

When you create a user or host profile, which three criteria can you use? (Choose three.)


A. Host or user group memberships


B. Administrative group membership


C. An existing access control policy


D. Location


E. Host or user attributes





A.
  Host or user group memberships

D.
  Location

E.
  Host or user attributes

An OT network architect must deploy a solution to protect fuel pumps in an industrial remote network. All the fuel pumps must be closely monitored from the corporate network for any temperature fluctuations. How can the OT network architect achieve this goal?


A. Configure a fuel server on the remote network, and deploy a FortiSIEM with a single pattern temperature security rule on the corporate network.


B. Configure a fuel server on the corporate network, and deploy a FortiSIEM with a single pattern temperature performance rule on the remote network.


C. Configure a fuel server on the remote network, and deploy a FortiSIEM with a single pattern temperature performance rule on the corporate network.


D. Configure both fuel server and FortiSIEM with a single-pattern temperature performance rule on the corporate network.





C.
  Configure a fuel server on the remote network, and deploy a FortiSIEM with a single pattern temperature performance rule on the corporate network.

Explanation: This way, FortiSIEM can discover and monitor everything attached to the remote network and provide security visibility to the corporate network.

What are two benefits of a Nozomi integration with FortiNAC? (Choose two.)


A. Enhanced point of connection details


B. Direct VLAN assignment


C. Adapter consolidation for multi-adapter hosts


D. Importation and classification of hosts





C.
  Adapter consolidation for multi-adapter hosts

D.
  Importation and classification of hosts

Explanation: The two benefits of a Nozomi integration with FortiNAC are enhanced point of connection details and importation and classification of hosts. Enhanced point of connection details allows for the identification and separation of traffic from multiple points of connection, such as Wi-Fi, wired, cellular, and VPN. Importation and classification of hosts allows for the automated importing and classification of host and device information into FortiNAC. This allows for better visibility and control of the network.


Page 1 out of 13 Pages