Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Fortinet NSE 6 Network Security Specialist NSE6_OTS_AR-7.6 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam NSE6_OTS_AR-7.6 Premium Access

View all detail and faqs for the NSE6_OTS_AR-7.6 exam


444 Students Passed

88% Average Score

90% Same Questions
Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibit.

Question # 1

A partial Application Sensor profile is shown. When you apply this profile in a firewall policy, which two statements are correct? (Choose two answers)

Options:

A.

A log is provided for each IEC command.

B.

A log is provided for each Modbus command.

C.

OT signatures are enabled.

D.

All OT protocols are blocked.

Questions # 2:

According to the IEC 62443 standard, your security level is 4 . What is your OT environment defending against? (Choose one answer)

Options:

A.

Intentional cyberthreats posed by skilled malicious users

B.

An intentional attack with low resources

C.

A syndicate of cyber extortion with extensive resources

D.

A casual exposure

Questions # 3:

Refer to the exhibit.

Question # 3

A Run_report task is shown. You want to automate the generation of a newly created report on FortiAnalyzer . When you configure the Run_report task in Playbook, why is the report not shown in the Report field? (Choose two answers)

Options:

A.

You must first configure the connector.

B.

You must first enable Extended Log Filtering in the report.

C.

You must first enable Auto-cache in the report.

D.

You must first configure an event handler.

E.

You must first select Playbook Starter, and then select the newly created report.

Questions # 4:

You want to protect OT devices that are not updated against known vulnerabilities so you apply virtual patching to the firewall policies. What must you check to confirm that the OT devices are virtually patched? (Choose one answer)

Options:

A.

The output of the CLI command get virtual-patch profile

B.

The OT View page

C.

The output of the CLI command get rule otvp status

D.

The Asset Identity List page

Questions # 5:

Refer to the exhibits.

Question # 5

A partial Basic Event Handler page on FortiAnalyzer and the creation of a trigger in a FortiGate device are shown. To improve the protection of your OT network, you want to automate the handling of compromised devices notified through FortiAnalyzer. You have configured an event handler named Alert_trigger as shown in the exhibit. When you create the trigger on the FortiGate device, the Event handler name field does not provide the Alert_trigger option. What two actions must you perform to make the Alert_trigger option available? (Choose two answers)

Options:

A.

You must click + Create in the Event handler name field.

B.

You must authorize the FortiGate device on FortiAnalyzer.

C.

You must configure the FortiAnalyzer setting on the FortiGate device.

D.

You must configure the trigger on the root FortiGate.

Questions # 6:

Refer to the exhibit.

Question # 6

A partial Application Sensor profile is shown. When you apply this profile in firewall policy, which two statements are correct? (Choose two answers)

Options:

A.

OT signatures are enabled.

B.

All OT protocols are monitored.

C.

Modbus write commands are blocked.

D.

A log is provided for each Modbus read holding registers command.

Questions # 7:

Refer to the exhibit.

Question # 7

The Core Network Security Connectors page of the FortiGate-2 device is shown. Which statement is correct? (Choose one answer)

Options:

A.

FortiGate-2 serves as Fabric Root.

B.

You must enable Security Fabric Connection on the FortiGate-2 interface.

C.

You must configure the FortiAnalyzer settings on FortiGate-2.

D.

FortiGate-2 is not authorized on the root FortiGate.

Questions # 8:

Refer to the exhibit.

Question # 8

A Virtual Patching profile is shown. You have recently updated your SCADA system and would like to apply the SCADA virtual patching profile. Which two statements about this profile are correct? (Choose two answers)

Options:

A.

Only the vulnerability Schneider.Electric.ClearSCADA.HTTP.Interface.XSS is still present.

B.

Low severity signatures are not blocked for the device with the MAC address 12:12:12:12:12.

C.

This profile blocks critical severity signatures for all the devices.

D.

The device with the MAC address 11:11:11:11:11 is considered to have no vulnerabilities.

Questions # 9:

Refer to the exhibit.

Question # 9

An industrial Ethernet protocol skipping layers 3 to 6 is shown. Which industrial Ethernet protocol is it? (Choose one answer)

Options:

A.

POWERLINK

B.

Ethernet over industrial protocol

C.

Modbus

D.

EtherCAT

Questions # 10:

Refer to the exhibit.

Question # 10

A partial OT network is shown. You have encountered many disconnections in the links and want to improve the availability of this network. Which action can you perform? (Choose one answer)

Options:

A.

You can implement HA clusters.

B.

You can implement SD-WAN at Floor-1-FortiGate and Floor-2-FortiGate.

C.

You can implement parallel redundancy protocol.

D.

You can implement VDOMs in Edge-FortiGate.

Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.