Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Fortinet NSE6_OTS_AR-7.6 Fortinet NSE 6 - OT Security 7.6 Architect Exam Practice Test

Fortinet NSE 6 - OT Security 7.6 Architect Questions and Answers

Question 1

Refer to the exhibit.

Question # 1

A Virtual Patching profile is shown. You have recently updated your SCADA system and would like to apply the SCADA virtual patching profile. Which two statements about this profile are correct? (Choose two answers)

Options:

A.

Only the vulnerability Schneider.Electric.ClearSCADA.HTTP.Interface.XSS is still present.

B.

Low severity signatures are not blocked for the device with the MAC address 12:12:12:12:12.

C.

This profile blocks critical severity signatures for all the devices.

D.

The device with the MAC address 11:11:11:11:11 is considered to have no vulnerabilities.

Question 2

Refer to the exhibits.

Question # 2

The Playbook Monitor dashboard and the analysis of the corresponding incident analysis are shown. You created the playbook with the objective of automatically attaching the report to the incident that was created. Which two statements are correct? (Choose two answers)

Options:

A.

You must wait for the report to be generated and attached to the incident.

B.

Only the Create_Incident task was executed.

C.

The tasks in the playbook must be reordered.

D.

The playbook was triggered manually.

Question 3

Refer to the exhibit.

Question # 3

A partial Application Sensor profile is shown. When you apply this profile in firewall policy, which two statements are correct? (Choose two answers)

Options:

A.

OT signatures are enabled.

B.

All OT protocols are monitored.

C.

Modbus write commands are blocked.

D.

A log is provided for each Modbus read holding registers command.

Question 4

In the Purdue model, at which level are physical assets like the Industrial Internet of Things (IIoT) placed? (Choose one answer)

Options:

A.

At Level 5 only

B.

At Level 1 only

C.

Above Level 4

D.

Below Level 3.5

Question 5

Refer to the exhibits.

Question # 5

A partial view of the Playbook Monitor page and the corresponding playbook configuration are shown. Based on the monitor page and the configuration of the playbook, what has triggered the Run_Report task? (Choose one answer)

Options:

A.

An IPS_Attack_Handling event

B.

An IPS incident creation

C.

An Event_Trigger log

D.

An IPS_Attack_Incident log

Question 6

What is the main OT component for monitoring and controlling industrial processes? (Choose one answer)

Options:

A.

Programmable Logical Controller (PLC)

B.

Supervisory Control and Data Acquisition (SCADA)

C.

Industrial Control System (ICS)

D.

Industrial Internet of Things (IIoT)

Question 7

Refer to the exhibit. A partial OT network is shown. You must improve the security of this OT network and implement internal segmentation between network 1 and network 2. How can you achieve the segmentation? (Choose one answer)

Question # 7

Options:

A.

You can configure universal ZTNA.

B.

You can configure one traffic VDOM.

C.

You can configure an explicit software switch.

D.

You can configure forward domain IDs for each network.

Question 8

What are two advantages provided by industrial Ethernet? (Choose two answers)

Options:

A.

Encryption

B.

Real-time control

C.

Remote access

D.

Determinism

Question 9

Refer to the exhibit.

Question # 9

Based on the information provided on the partial Event Monitor page shown in the exhibit, how was the attack detected? (Choose one answer)

Options:

A.

Automatically by a stitch

B.

Manually by an administrator

C.

Automatically by a playbook

D.

Automatically by an event handler

Question 10

Refer to the exhibits.

Question # 10

Question # 10

A partial Incident Analysis page and the log details related to the event are shown. An attack is reported on your OT network. You analyze the corresponding incident. Based on the information provided on the Incident Analysis page and the log details, which two statements are correct? (Choose two answers)

Options:

A.

The attack uses the Modbus protocol.

B.

The attack is mitigated.

C.

The attack uses the IEC 104 protocol.

D.

The event severity is high.

E.

The target device IP address is 10.1.5.20.