Discount Offer
Go Back on NSE7_OTS-7.2 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

NSE7_OTS-7.2 Practice Test

Whether you're a beginner or brushing up on skills, our NSE7_OTS-7.2 practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 3 out of 13 Pages

You are investigating a series of incidents that occurred in the OT network over past 24 hours in FortiSIEM. Which three FortiSIEM options can you use to investigate these incidents? (Choose three.)


A. Security


B. IPS


C. List


D. Risk


E. Overview





C.
  List

D.
  Risk

E.
  Overview

An administrator wants to use FortiSoC and SOAR features on a FortiAnalyzer device to detect and block any unauthorized access to FortiGate devices in an OT network. Which two statements about FortiSoC and SOAR features on FortiAnalyzer are true? (Choose two.)


A. You must set correct operator in event handler to trigger an event.


B. You can automate SOC tasks through playbooks.


C. Each playbook can include multiple triggers.


D. You cannot use Windows and Linux hosts security events with FortiSoC.





A.
  You must set correct operator in event handler to trigger an event.

B.
  You can automate SOC tasks through playbooks.

The OT network analyst runs different level of reports to quickly explore threats that exploit the network. Such reports can be run on all routers, switches, and firewalls. Which FortiSIEM reporting method helps to identify these type of exploits of image firmware files?


A. CMDB reports


B. Threat hunting reports


C. Compliance reports


D. OT/loT reports





B.
  Threat hunting reports

The OT network analyst run different level of reports to quickly explore failures that could put the network at risk. Such reports can be about device performance. Which FortiSIEM reporting method helps to identify device failures?


A. Business service reports


B. Device inventory reports


C. CMDB operational reports


D. Active dependent rules reports





C.
  CMDB operational reports

Which three common breach points can be found in a typical OT environment? (Choose three.)


A. Global hat


B. Hard hat


C. VLAN exploits


D. Black hat


E. RTU exploits





B.
  Hard hat

D.
  Black hat

E.
  RTU exploits


Page 3 out of 13 Pages
Previous