Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Fortinet NSE 7 - OT Security 7.2 Question and Answers

Fortinet NSE 7 - OT Security 7.2

Last Update Oct 4, 2025
Total Questions : 69

We are offering FREE NSE7_OTS-7.2 Fortinet exam questions. All you do is to just go and sign up. Give your details, prepare NSE7_OTS-7.2 free exam questions and then go for complete pool of Fortinet NSE 7 - OT Security 7.2 test questions that will help you more.

NSE7_OTS-7.2 pdf

NSE7_OTS-7.2 PDF

$36.75  $104.99
NSE7_OTS-7.2 Engine

NSE7_OTS-7.2 Testing Engine

$43.75  $124.99
NSE7_OTS-7.2 PDF + Engine

NSE7_OTS-7.2 PDF + Testing Engine

$57.75  $164.99
Questions 1

Refer to the exhibit.

Which statement about the interfaces shown in the exhibit is true?

Options:

A.  

port2, port2-vlan10, and port2-vlan1 are part of the software switch interface.

B.  

The VLAN ID of port1-vlan1 can be changed to the VLAN ID 10.

C.  

port1-vlan10 and port2-vlan10 are part of the same broadcast domain

D.  

port1, port1-vlan10, and port1-vlan1 are in different broadcast domains

Discussion 0
Questions 2

Refer to the exhibit.

PLC-3 and CLIENT can send traffic to PLC-1 and PLC-2. FGT-2 has only one software switch (SSW-1) connecting both PLC-3 and CLIENT. PLC-3 and CLIENT can send traffic to each other at the Layer 2 level.

What must the OT admin do to prevent Layer 2-level communication between PLC-3 and CLIENT?

Options:

A.  

Set a unique forward domain for each interface of the software switch.

B.  

Create a VLAN for each device and replace the current FGT-2 software switch members.

C.  

Enable explicit intra-switch policy to require firewall policies on FGT-2.

D.  

Implement policy routes on FGT-2 to control traffic between devices.

Discussion 0
Questions 3

An OT network architect needs to secure control area zones with a single network access policy to provision devices to any number of different networks.

On which device can this be accomplished?

Options:

A.  

FortiGate

B.  

FortiEDR

C.  

FortiSwitch

D.  

FortiNAC

Discussion 0
Questions 4

Which two statements are true when you deploy FortiGate as an offline IDS? (Choose two.)

Options:

A.  

FortiGate receives traffic from configured port mirroring.

B.  

Network traffic goes through FortiGate.

C.  

FortiGate acts as network sensor.

D.  

Network attacks can be detected and blocked.

Discussion 0
Questions 5

Refer to the exhibit.

You are creating a new operational technology (OT) rule to monitor Modbus protocol traffic on FortiSIEM

Which action must you take to ensure that all Modbus messages on the network match the rule?

Options:

A.  

Add a new condition to filter Modbus traffic based on the source TCP/UDP port

B.  

The condition on the SubPattern filter must use the AND logical operator

C.  

the Aggregate section, set the attribute value to equal to or greater than 0

D.  

In the Group By section remove all attributes that are not configured in the Filter section

Discussion 0
Questions 6

Refer to the exhibit and analyze the output.

Which statement about the output is true?

Options:

A.  

This is a sample of a FortiAnalyzer system interface event log.

B.  

This is a sample of an SNMP temperature control event log.

C.  

This is a sample of a PAM event type.

D.  

This is a sample of FortiGate interface statistics.

Discussion 0
Questions 7

What can be assigned using network access control policies?

Options:

A.  

Layer 3 polling intervals

B.  

FortiNAC device polling methods

C.  

Logical networks

D.  

Profiling rules

Discussion 0
Questions 8

How can you achieve remote access and internet availability in an OT network?

Options:

A.  

Create a back-end backup network as a redundancy measure.

B.  

Implement SD-WAN to manage traffic on each ISP link.

C.  

Add additional internal firewalls to access OT devices.

D.  

Create more access policies to prevent unauthorized access.

Discussion 0
Questions 9

Refer to the exhibits.

Which statement is true about the traffic passing through to PLC-2?

Options:

A.  

IPS must be enabled to inspect application signatures.

B.  

The application filter overrides the default action of some IEC 104 signatures.

C.  

IEC 104 signatures are all allowed except the

C.  

BO.NA 1 signature.

D.  

SSL Inspection must be set to deep-inspection to correctly apply application control.

Discussion 0
Questions 10

Refer to the exhibit.

Based on the Purdue model, which three measures can be implemented in the control area zone using the Fortinet Security Fabric? (Choose three.)

Options:

A.  

FortiGate for SD-WAN

B.  

FortiGate for application control and IPS

C.  

FortiNAC for network access control

D.  

FortiSIEM for security incident and event management

E.  

FortiEDR for endpoint detection

Discussion 0
Questions 11

When device profiling rules are enabled, which devices connected on the network are evaluated by the device profiling rules?

Options:

A.  

Known trusted devices, each time they change location

B.  

All connected devices, each time they connect

C.  

Rogue devices, only when they connect for the first time

D.  

Rogue devices, each time they connect

Discussion 0
Questions 12

An OT network consists of multiple FortiGate devices. The edge FortiGate device is deployed as the secure gateway and is only allowing remote operators to access the ICS networks on site.

Management hires a third-party company to conduct health and safety on site. The third-party company must have outbound access to external resources.

As the OT network administrator, what is the best scenario to provide external access to the third-party company while continuing to secure the ICS networks?

Options:

A.  

Configure outbound security policies with limited active authentication users of the third-party company.

B.  

Create VPN tunnels between downstream FortiGate devices and the edge FortiGate to protect ICS network traffic.

C.  

Split the edge FortiGate device into multiple logical devices to allocate an independent VDOM for the third-party company.

D.  

Implement an additional firewall using an additional upstream link to the internet.

Discussion 0
Questions 13

The OT network analyst runs different level of reports to quickly explore threats that exploit the network. Such reports can be run on all routers, switches, and firewalls. Which FortiSIEM reporting method helps to identify these type of exploits of image firmware files?

Options:

A.  

CMDB reports

B.  

Threat hunting reports

C.  

Compliance reports

D.  

OT/loT reports

Discussion 0
Questions 14

As an OT network administrator you are managing three FortiGate devices that each protect different levels on the Purdue model To increase traffic visibility you are required to implement additional security measures to detect protocols from PLCs

Which security sensor must you implement to detect protocols on the OT network?

Options:

A.  

Endpoint Detection and Response (EDR)

B.  

Deep packet inspection (DPI)

C.  

Intrusion prevention system (IPS)

D.  

Application control (AC)

Discussion 0
Questions 15

Refer to the exhibit.

Which statement is true about application control inspection?

Options:

A.  

The industrial application control inspection process is unique among application categories.

B.  

Security actions cannot be applied on the lowest level of the hierarchy.

C.  

You can control security actions only on the parent-level application signature

D.  

The parent signature takes precedence over the child application signature.

Discussion 0
Questions 16

Refer to the exhibit.

You are navigating through FortiSIEM in an OT network.

How do you view information presented in the exhibit and what does the FortiGate device security status tell you?

Options:

A.  

In the PCI logging dashboard and there are one or more high-severity security incidents for the FortiGate device.

B.  

In the summary dashboard and there are one or more high-severity security incidents for the FortiGate device.

C.  

In the widget dashboard and there are one or more high-severity incidents for the FortiGate device.

D.  

In the business service dashboard and there are one or more high-severity security incidents for the FortiGate device.

Discussion 0
Questions 17

With the limit of using one firewall device, the administrator enables multi-VDOM on FortiGate to provide independent multiple security domains to each ICS network. Which statement ensures security protection is in place for all ICS networks?

Options:

A.  

Each traffic VDOM must have a direct connection to FortiGuard services to receive the required security updates.

B.  

The management VDOM must have access to all global security services.

C.  

Each VDOM must have an independent security license.

D.  

Traffic between VDOMs must pass through the physical interfaces of FortiGate to check for security incidents.

Discussion 0
Questions 18

Refer to the exhibit.

Based on the topology designed by the OT architect, which two statements about implementing OT security are true? (Choose two.)

Options:

A.  

Firewall policies should be configured on FortiGate-3 and FortiGate-4 with industrial protocol sensors.

B.  

Micro-segmentation can be achieved only by replacing FortiGate-3 and FortiGate-4 with a pair of FortiSwitch devices.

C.  

IT and OT networks are separated by segmentation.

D.  

FortiGate-3 and FortiGate-4 devices must be in a transparent mode.

Discussion 0
Questions 19

An administrator wants to use FortiSoC and SOAR features on a FortiAnalyzer device to detect and block any unauthorized access to FortiGate devices in an OT network.

Which two statements about FortiSoC and SOAR features on FortiAnalyzer are true? (Choose two.)

Options:

A.  

You must set correct operator in event handler to trigger an event.

B.  

You can automate SOC tasks through playbooks.

C.  

Each playbook can include multiple triggers.

D.  

You cannot use Windows and Linux hosts security events with FortiSoC.

Discussion 0
Questions 20

Refer to the exhibit.

The IPS profile is added on all of the security policies on FortiGate.

For an OT network, which statement of the IPS profile is true?

Options:

A.  

FortiGate has no IPS industrial signature database enabled.

B.  

The listed IPS signatures are classified as SCADA equipment.

C.  

All IPS signatures are overridden and must block traffic match signature patterns.

D.  

The IPS profile inspects only traffic originating from SCADA equipment.

Discussion 0