What triggers Layer 2 polling of infrastructure devices connected in the network?
Which statement is correct about processing matched rogue devices by FortiNAC?
What can be assigned using network access control policies?
Refer to the exhibit.
You are navigating through FortiSIEM in an OT network.
How do you view information presented in the exhibit and what does the FortiGate device security status tell you?
An OT administrator has configured FSSO and local firewall authentication. A user who is part of a user group is not prompted from credentials during authentication.
What is a possible reason?
Refer to the exhibit.
Given the configurations on the FortiGate, which statement is true?
As an OT network administrator, you are managing three FortiGate devices that each protect different levels on the Purdue model. To increase traffic visibility, you are required to implement additional security measures to detect exploits that affect PLCs.
Which security sensor must implement to detect these types of industrial exploits?
Which two frameworks are common to secure ICS industrial processes, including SCADA and DCS? (Choose two.)
Which three Fortinet products can you use for device identification in an OT industrial control system (ICS)? (Choose three.)
Refer to the exhibit.
You need to configure VPN user access for supervisors at the breach and HQ sites using the same soft FortiToken. Each site has a FortiGate VPN gateway.
What must you do to achieve this objective?