Refer to the exhibit, which shows a non-protected OT environment.
An administrator needs to implement proper protection on the OT network.
Which three steps should an administrator take to protect the OT network? (Choose three.)
Correct Answer:
ACD
Which three methods of communication are used by FortiNAC to gather visibility information? (Choose three.)
Correct Answer:
ACD
Refer to the exhibit.
You need to configure VPN user access for supervisors at the breach and HQ sites using the same soft FortiToken. Each site has a FortiGate VPN gateway.
What must you do to achieve this objective?
Correct Answer:
A
Refer to the exhibit.
Based on the Purdue model, which three measures can be implemented in the control area zone using the Fortinet Security Fabric? (Choose three.)
Correct Answer:
BCD
Which three Fortinet products can be used for device identification in an OT industrial control system (ICS)? (Choose three.)
Correct Answer:
ACD