Which three methods of communication are used by FortiNAC to gather visibility information? (Choose three.)
A. SNMP
B. ICMP
C. API
D. RADIUS
E. TACACS
Which two statements about the Modbus protocol are true? (Choose two.)
A. Modbus uses UDP frames to transport MBAP and function codes.
B. Most of the PLC brands come with a built-in Modbus module.
C. You can implement Modbus networking settings on internetworking devices.
D. Modbus is used to establish communication between intelligent devices.
Which two frameworks are common to secure ICS industrial processes, including SCADA and DCS? (Choose two.)
A. Modbus
B. NIST Cybersecurity
C. IEC 62443
D. IEC104
What can be assigned using network access control policies?
A. Layer 3 polling intervals
B. FortiNAC device polling methods
C. Logical networks
D. Profiling rules
To increase security protection in an OT network, how does application control on ForliGate detect industrial traffic?
A. By inspecting software and software-based vulnerabilities
B. By inspecting applications only on nonprotected traffic
C. By inspecting applications with more granularity by inspecting subapplication traffic
D. By inspecting protocols used in the application traffic
Page 4 out of 13 Pages |
Previous |