Total 63 Questions
Last Updated On : 26-Nov-2025
Which statement is correct about processing matched rogue devices by FortiNAC?
A. FortiNAC cannot revalidate matched devices.
B. FortiNAC remembers the match ng rule of the rogue device
C. FortiNAC disables matching rule of previously-profiled rogue devices.
D. FortiNAC matches the rogue device with only one device profiling rule.
When device profiling rules are enabled, which devices connected on the network are evaluated by the device profiling rules?
A. Known trusted devices, each time they change location
B. All connected devices, each time they connect
C. Rogue devices, only when they connect for the first time
D. Rogue devices, each time they connect
How can you achieve remote access and internet availability in an OT network?
A. Create a back-end backup network as a redundancy measure.
B. Implement SD-WAN to manage traffic on each ISP link.
C. Add additional internal firewalls to access OT devices.
D. Create more access policies to prevent unauthorized access.
You are investigating a series of incidents that occurred in the OT network over past 24 hours in FortiSIEM. Which three FortiSIEM options can you use to investigate these incidents? (Choose three.)
A. Security
B. IPS
C. List
D. Risk
E. Overview
An administrator wants to use FortiSoC and SOAR features on a FortiAnalyzer device to detect and block any unauthorized access to FortiGate devices in an OT network. Which two statements about FortiSoC and SOAR features on FortiAnalyzer are true? (Choose two.)
A. You must set correct operator in event handler to trigger an event.
B. You can automate SOC tasks through playbooks.
C. Each playbook can include multiple triggers.
D. You cannot use Windows and Linux hosts security events with FortiSoC.
The OT network analyst runs different level of reports to quickly explore threats that exploit the network. Such reports can be run on all routers, switches, and firewalls. Which FortiSIEM reporting method helps to identify these type of exploits of image firmware files?
A. CMDB reports
B. Threat hunting reports
C. Compliance reports
D. OT/loT reports
The OT network analyst run different level of reports to quickly explore failures that could put the network at risk. Such reports can be about device performance. Which FortiSIEM reporting method helps to identify device failures?
A. Business service reports
B. Device inventory reports
C. CMDB operational reports
D. Active dependent rules reports
| Page 2 out of 9 Pages |
| NSE7_OTS-7.2 Practice Test Home |
Our new Timed NSE7_OTS-7.2 Exam Simulation replicates the exact format, question count, and strict time limit of the real test.
We don't just test your knowledge; we build your Fortinet exam-day stamina and speed, so you can answer with confidence when it matters most.