Discount Offer
Go Back on NSE7_OTS-7.2 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

NSE7_OTS-7.2 Practice Test

Whether you're a beginner or brushing up on skills, our NSE7_OTS-7.2 practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 2 out of 13 Pages

An OT network administrator is trying to implement active authentication. Which two methods should the administrator use to achieve this? (Choose two.)


A. Two-factor authentication on FortiAuthenticator


B. Role-based authentication on FortiNAC


C. FSSO authentication on FortiGate


D. Local authentication on FortiGate





A.
  Two-factor authentication on FortiAuthenticator

D.
  Local authentication on FortiGate

An OT administrator configured and ran a default application risk and control report in FortiAnalyzer to learn more about the key application crossing the network. However, the report output is empty despite the fact that some related real-time and historical logs are visible in the FortiAnalyzer. What are two possible reasons why the report output was empty? (Choose two.)


A. The administrator selected the wrong logs to be indexed in FortiAnalyzer.


B. The administrator selected the wrong time period for the report.


C. The administrator selected the wrong devices in the Devices section.


D. The administrator selected the wrong hcache table for the report.





B.
  The administrator selected the wrong time period for the report.

C.
  The administrator selected the wrong devices in the Devices section.

Which statement is correct about processing matched rogue devices by FortiNAC?


A. FortiNAC cannot revalidate matched devices.


B. FortiNAC remembers the match ng rule of the rogue device


C. FortiNAC disables matching rule of previously-profiled rogue devices.


D. FortiNAC matches the rogue device with only one device profiling rule.





D.
  FortiNAC matches the rogue device with only one device profiling rule.

When device profiling rules are enabled, which devices connected on the network are evaluated by the device profiling rules?


A. Known trusted devices, each time they change location


B. All connected devices, each time they connect


C. Rogue devices, only when they connect for the first time


D. Rogue devices, each time they connect





C.
  Rogue devices, only when they connect for the first time

How can you achieve remote access and internet availability in an OT network?


A. Create a back-end backup network as a redundancy measure.


B. Implement SD-WAN to manage traffic on each ISP link.


C. Add additional internal firewalls to access OT devices.


D. Create more access policies to prevent unauthorized access.





B.
  Implement SD-WAN to manage traffic on each ISP link.


Page 2 out of 13 Pages
Previous