exam questions

Exam NSE7_OTS-6.4 All Questions

View all questions & answers for the NSE7_OTS-6.4 exam

Exam NSE7_OTS-6.4 topic 1 question 20 discussion

Actual exam question from Fortinet's NSE7_OTS-6.4
Question #: 20
Topic #: 1
[All NSE7_OTS-6.4 Questions]

Refer to the exhibit, which shows a non-protected OT environment.

An administrator needs to implement proper protection on the OT network.
Which three steps should an administrator take to protect the OT network? (Choose three.)

  • A. Deploy an edge FortiGate between the internet and an OT network as a one-arm sniffer.
  • B. Deploy a FortiGate device within each ICS network.
  • C. Configure firewall policies with web filter to protect the different ICS networks.
  • D. Configure firewall policies with industrial protocol sensors
  • E. Use segmentation
Show Suggested Answer Hide Answer
Suggested Answer: BDE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Pledian
1 month ago
The correct answers are C, D, and E. A, B, and C are incorrect answers. A. Powering on the VM will not allow it to be live migrated to Clusters A and B. B. Disabling EVC will prevent the VM from being live migrated to Clusters A and B. C. Rebooting the VM will not allow it to be live migrated to Clusters A and B.
upvoted 1 times
...
ali_red
2 months, 2 weeks ago
Selected Answer: BDE
BDE for sure
upvoted 3 times
...
Spippolo
4 months, 2 weeks ago
Selected Answer: BDE
To protect the different IS environments and limit the propagation of attacks coming from IT to the different ICS networks or elements, segmentation is recommended. In this example, the FortiGate creates conduits that stop threats from propagating between ICS network 1 and ICS network 2. Expanding on this concept, by placing FortiGate devices at strategic points within the IS network itself, you can granularly segment different zones creating an extra layer of protection for the endpoints and controllers as well as protect the data flow and communications between them. FortiGate has specific ICS and SCADA-aware functionality, and can identify and police most of the common ICS and SCADA protocols. In parallel to this specific protocol support, additional vulnerability protection is provided for applications and devices from the major ICS manufacturers through a set of signatures.
upvoted 1 times
...
cciesam
5 months, 2 weeks ago
Selected Answer: BDE
Ans: BDE
upvoted 1 times
...
Net_Sec2
6 months, 3 weeks ago
Selected Answer: BDE
Explanation/Reference:studyguide_page181
upvoted 1 times
...
Jbeaulieu
7 months ago
Selected Answer: BDE
study guide OT 6.4 , page 181
upvoted 1 times
...
pochmendoza
8 months ago
Selected Answer: BDE
This should be B, D, E from study guide, page 181
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago