You are investigating a series of incidents that occurred in the OT network over past 24 hours in FortiSIEM. Which three FortiSIEM options can you use to investigate these incidents? (Choose three.)
A. Security
B. IPS
C. List
D. Risk
E. Overview
An administrator wants to use FortiSoC and SOAR features on a FortiAnalyzer device to detect and block any unauthorized access to FortiGate devices in an OT network. Which two statements about FortiSoC and SOAR features on FortiAnalyzer are true? (Choose two.)
A. You must set correct operator in event handler to trigger an event.
B. You can automate SOC tasks through playbooks.
C. Each playbook can include multiple triggers.
D. You cannot use Windows and Linux hosts security events with FortiSoC.
The OT network analyst runs different level of reports to quickly explore threats that exploit the network. Such reports can be run on all routers, switches, and firewalls. Which FortiSIEM reporting method helps to identify these type of exploits of image firmware files?
A. CMDB reports
B. Threat hunting reports
C. Compliance reports
D. OT/loT reports
The OT network analyst run different level of reports to quickly explore failures that could put the network at risk. Such reports can be about device performance. Which FortiSIEM reporting method helps to identify device failures?
A. Business service reports
B. Device inventory reports
C. CMDB operational reports
D. Active dependent rules reports
Which three common breach points can be found in a typical OT environment? (Choose three.)
A. Global hat
B. Hard hat
C. VLAN exploits
D. Black hat
E. RTU exploits
Page 3 out of 13 Pages |
Previous |