Download Fortinet NSE 7 - OT Security 7.2.NSE7_OTS-7.2.ExamTopics.2025-09-25.36q.tqb

Vendor: Fortinet
Exam Code: NSE7_OTS-7.2
Exam Name: Fortinet NSE 7 - OT Security 7.2
Date: Sep 25, 2025
File Size: 2 MB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
As an OT network administrator, you are managing three FortiGate devices that each protect different levels on the Purdue model. To increase traffic visibility, you are required to implement additional security measures to detect protocols from PLCs.
Which security sensor must you implement to detect protocols on the OT network?
  1. Antivirusinspection
  2. Intrusion prevention system (IPS)
  3. Application control
  4. Deep packet inspection (DPI)
Correct answer: C
Explanation:
B: 1C: 5 - Mosted
B: 1C: 5 - Mosted
Question 2
Which two statements are true when you deploy FortiGate as an offline IDS? (Choose two.)
  1. Network traffic goes through FortiGate.
  2. Network attacks can be detected and blocked.
  3. FortiGate acts as network sensor.
  4. FortiGate receives traffic from configured port mirroring.
Correct answer: CD
Explanation:
CD: 1
CD: 1
Question 3
Refer to the exhibit.
A new operational technology rule is being created to monitor Modbus protocol traffic on FortiSIEM.
Which action will ensure all Modbus messages on the network match the rule?
  1. Set the Aggregate attribute value to equal to or greater than zero.
  2. Add a new condition to filter Modbus traffic based on the Source TCP/UDP port.
  3. This rule is valid and requires no additional changes.
  4. Remove attributes in the Group By section that are not configured in the Filter section.
Correct answer: B
Explanation:
B: 1
B: 1
Question 4
Refer to the exhibit.
You are assigned to implement a remote authentication server in the OT network.
Which part of the hierarchy should the authentication server be part of?
  1. Edge
  2. Cloud
  3. Core
  4. Access
Correct answer: C
Explanation:
A: 2 - MostedC: 2
A: 2 - MostedC: 2
Question 5
Refer to the exhibit.
From your analysis of the output, which statement about the output is true?
  1. This is a sample of an SNMP temperature control event log.
  2. This is a sample of a FortiAnalyzer system interface event log.
  3. This is a sample of a PAM event type.
  4. This is a sample of FortiGate interface statistics.
Correct answer: D
Explanation:
C: 3
C: 3
Question 6
You are investigating a series of incidents that occurred in the OT network over past 24 hours in FortiSIEM.
Which three FortiSIEM options can you use to investigate these incidents? (Choose three.)
  1. Risk
  2. IPS
  3. List
  4. Security
  5. Overview
Correct answer: ACE
Explanation:
ACE: 1
ACE: 1
Question 7
An OT administrator has configured FSSO and local firewall authentication. A user who is part of a user group is not prompted for credentials during authentication.
What is a possible reason?
  1. Two-factor authentication is not configured with the RADIUS authentication method.
  2. The user was determined by the Security Fabric.
  3. FortiGate determined the user by passive authentication.
  4. FortiNAC determined the user by the DHCP fingerprint method.
Correct answer: C
Explanation:
C: 1
C: 1
Question 8
With the limit of using one firewall device, the administrator enables multi-VDOM on FortiGate to provide independent multiple security domains to each ICS network.
Which statement ensures security protection is in place for all ICS networks?
  1. Each traffic VDOM must have a direct connection to FortiGuard services to receive the required security updates.
  2. The management VDOM must have access to all global security services.
  3. Each VDOM must have an independent security license.
  4. Traffic between VDOMs must pass through the physical interfaces of FortiGate to check for security incidents.
Correct answer: B
Explanation:
B: 1
B: 1
Question 9
What are two critical tasks the OT network auditors must perform during OT network risk assessment and management? (Choose two.)
  1. Implementing strategies to automatically bring PLCs offline
  2. Planning a threat hunting strategy
  3. Creating disaster recovery plans to switch operations to a backup plant
  4. Evaluating what can go wrong before it happens
Correct answer: BD
Explanation:
BD: 1
BD: 1
Question 10
Which type of attack posed by skilled and malicious users of security level 3 (SL 3) of IEC 62443 is designed to defend against intentional attacks?
  1. Unintentional operator error
  2. Access to moderate resources
  3. Low access to resources
  4. Substantial resources
Correct answer: B
Explanation:
B: 1
B: 1
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!