Last Updated On : 13-Jan-2026
Total 63 Questions
Which three common breach points can be found in a typical OT environment? (Choose three.)
A. Global hat
B. Hard hat
C. VLAN exploits
D. Black hat
E. RTU exploits
Explanation:
In a typical OT environment, common breach points include:
C. VLAN exploits:
Weak segmentation or misconfigured VLANs in industrial networks can allow lateral movement between IT and OT zones, violating the Purdue Model.
D. Black hat:
Malicious actors ("black hats") targeting industrial systems for sabotage, espionage, or ransomware represent an external human breach point.
E. RTU exploits:
Remote Terminal Units (RTUs) are field devices often running outdated firmware with known vulnerabilities and exposed via insecure protocols, making them frequent entry points.
Why other options are incorrect:
A. Global hat:
Not a recognized security term; likely a distractor referencing "white hat" (ethical hacker) or "gray hat."
B. Hard hat:
Refers to physical safety equipment, not a cybersecurity breach vector.
Reference:
Fortinet NSE 7 OT Security curriculum and industry frameworks like MITRE ATT&CK for ICS identify these vectors: network segmentation flaws (VLAN hopping), malicious actors, and vulnerable field devices (RTUs/PLCs) as primary OT attack surfaces.
Which three methods of communication are used by FortiNAC to gather visibility information? (Choose three.)
A. SNMP
B. ICMP
C. API
D. RADIUS
E. TACACS
✅ Explanation:
SNMP (Simple Network Management Protocol): FortiNAC uses SNMP to query switches, routers, and wireless controllers for information about connected endpoints. This provides visibility into MAC addresses, IP addresses, and port-level activity. SNMP polling is one of the primary mechanisms for device discovery and monitoring in FortiNAC.
ICMP (Internet Control Message Protocol): FortiNAC leverages ICMP (ping sweeps) to detect live hosts on the network. This helps identify endpoints that may not be visible through switch queries alone. ICMP is a lightweight method to confirm device presence and gather basic visibility data.
API (Application Programming Interface): FortiNAC integrates with network infrastructure and security systems via APIs. This allows FortiNAC to pull detailed visibility information from FortiGate, FortiSwitch, wireless controllers, and other third-party systems. APIs extend visibility beyond traditional SNMP/ICMP polling.
❌ Why the Other Options Are Wrong
D. RADIUS:
RADIUS is used for authentication and policy enforcement, not for gathering visibility information. FortiNAC can act as a RADIUS server, but that’s for access control, not endpoint discovery.
E. TACACS:
TACACS+ is another authentication protocol, primarily used for administrative access control. It is not a visibility-gathering mechanism in FortiNAC.
📖 Reference:
Fortinet Documentation –
FortiNAC Network Visibility
Which two statements about the Modbus protocol are true? (Choose two.)
A. Modbus uses UDP frames to transport MBAP and function codes.
B. Most of the PLC brands come with a built-in Modbus module.
C. You can implement Modbus networking settings on internetworking devices.
D. Modbus is used to establish communication between intelligent devices.
Explanation:
B. Most of the PLC brands come with a built-in Modbus module.
Modbus is an industry-standard protocol widely adopted across PLC manufacturers (Siemens, Allen-Bradley, Schneider, etc.). Most PLCs include native or optional Modbus communication modules due to its simplicity and interoperability.
D. Modbus is used to establish communication between intelligent devices.
Modbus facilitates master-slave/client-server communication between industrial devices like PLCs, HMIs, RTUs, and SCADA systems for data exchange (reading/writing registers, coils).
Why other options are incorrect:
A. Modbus uses UDP frames to transport MBAP and function codes.
→ Incorrect. While Modbus can use TCP/IP (MBAP header) over Ethernet, it does not use UDP for MBAP. Modbus RTU/ASCII uses serial, and Modbus TCP uses TCP (port 502).
C. You can implement Modbus networking settings on internetworking devices.
→ Incorrect. Modbus is an application-layer protocol; networking devices (routers/switches) transport the traffic but do not implement Modbus-specific settings like function codes or register mapping.
Reference:
Fortinet NSE 7 OT Security curriculum and Modbus specifications (Modbus.org) note Modbus as a common built-in PLC protocol for device-to-device communication in industrial environments.
Which two frameworks are common to secure ICS industrial processes, including SCADA and DCS? (Choose two.)
A. Modbus
B. NIST Cybersecurity
C. IEC 62443
D. IEC104
Explanation:
B. NIST Cybersecurity Framework (specifically NIST SP 800-82):
The NIST Cybersecurity Framework and its Industrial Control Systems (ICS) supplement (NIST SP 800-82) provide guidelines for securing critical infrastructure, including SCADA and DCS environments. It offers a risk-based approach with core functions: Identify, Protect, Detect, Respond, Recover.
C. IEC 62443:
This is the primary international series of standards specifically designed for OT/ICS security. It covers security program requirements, system design, and technical controls for industrial automation and control systems (IACS), including SCADA and DCS.
Why other options are incorrect:
A. Modbus: A communication protocol, not a security framework. Modbus itself lacks native security features.
D. IEC104 (IEC 60870-5-104):
A telecontrol protocol used in electrical utility SCADA systems, not a security framework.
Reference:
Fortinet NSE 7 OT Security curriculum emphasizes IEC 62443 as the industry-specific standard and NIST frameworks (particularly NIST SP 800-82) as widely adopted guidelines for securing industrial processes.
What can be assigned using network access control policies?
A. Layer 3 polling intervals
B. FortiNAC device polling methods
C. Logical networks
D. Profiling rules
Explanation:
In FortiNAC (Network Access Control), logical networks (also known as role-based VLANs or access control groups) are assigned through network access control policies. These policies determine which VLAN, firewall zone, or network segment a device or user is placed into based on attributes like device type, user role, compliance status, or location.
Why other options are incorrect:
A. Layer 3 polling intervals:These are visibility/discovery settings, not access control policy assignments.
B. FortiNAC device polling methods: These are configuration parameters for how FortiNAC gathers data from network devices, not policy assignments for endpoints.
D. Profiling rules: These are used to identify and classify devices, not to assign network access. Profiling results can inform policy decisions, but the rules themselves are not assigned via access policies.
Reference:
FortiNAC Administration Guide states that "access control policies map devices/users to logical networks (VLANs, zones) based on conditions" (FortiNAC 9.4 Admin Guide, Network Access Policies chapter). This is fundamental to implementing dynamic segmentation in OT/IT environments.
To increase security protection in an OT network, how does application control on ForliGate detect industrial traffic?
A. By inspecting software and software-based vulnerabilities
B. By inspecting applications only on nonprotected traffic
C. By inspecting applications with more granularity by inspecting subapplication traffic
D. By inspecting protocols used in the application traffic
Explanation:
FortiGate's application control for OT/industrial traffic primarily functions by deep packet inspection (DPI) of the specific protocols used in industrial applications, such as Modbus, DNP3, CIP, IEC 60870-5-104, and Siemens S7. It decodes these protocol headers and function codes to identify the industrial application in use, validate message structure, and detect anomalous or malicious commands.
Why other options are incorrect:
A. By inspecting software and software-based vulnerabilities:
This describes vulnerability scanning or endpoint protection, not application control for traffic inspection.
B. By inspecting applications only on nonprotected traffic:
Application control inspects both encrypted and unencrypted traffic where protocols are detectable; it is not limited to "nonprotected" traffic.
C. By inspecting applications with more granularity by inspecting subapplication traffic:
While OT inspection does offer granularity (e.g., Modbus function codes), the core detection mechanism is protocol-based, not "subapplication" categorization typical of IT web applications.
Reference:
FortiOS OT Security Guide explains that "Industrial Protocol inspection identifies and controls industrial applications based on protocol decoding" (FortiOS 7.2 Administration Guide, OT Security chapter). This protocol-aware inspection is fundamental to OT application control.
An OT administrator deployed many devices to secure the OT network. However, the SOC team is reporting that there are too many alerts, and that many of the alerts are false positive. The OT administrator would like to find a solution that eliminates repetitive tasks, improves efficiency, saves time, and saves resources. Which products should the administrator deploy to address these issues and automate most of the manual tasks done by the SOC team?
A. FortiSIEM and FortiManager
B. FortiSandbox and FortiSIEM
C. FortiSOAR and FortiSIEM
D. A syslog server and FortiSIEM
Explanation:
The scenario describes alert fatigue and false positives overwhelming the SOC team. FortiSOAR (Security Orchestration, Automation, and Response) is specifically designed to automate repetitive SOC tasks, such as:
Triaging and correlating alerts from FortiSIEM
Automating incident response workflows (playbooks)
Enriching alerts with threat intelligence
Executing automated remediation actions (like blocking IPs or isolating endpoints)
FortiSIEM provides the foundational visibility, correlation, and alerting. Together, FortiSOAR + FortiSIEM create an automated SOC workflow that reduces manual effort, improves efficiency, and minimizes false positive handling time.
Why other options are incorrect:
A. FortiSIEM and FortiManager:
FortiManager is for centralized device management, not SOC task automation.
B. FortiSandbox and FortiSIEM:
FortiSandbox provides advanced threat detection but does not automate SOC workflows or reduce alert fatigue directly.
D. A syslog server and FortiSIEM:
A syslog server is a log collection tool; it adds data sources but does not automate SOC processes.
Reference:
FortiSOAR documentation highlights its role in "automating SOC workflows to reduce mean time to respond (MTTR) and eliminate repetitive tasks" (FortiSOAR 7.2 Admin Guide). This integration with FortiSIEM is a key use case in OT security operations.
| Page 3 out of 9 Pages |
| NSE7_OTS-7.2 Practice Test Home | Previous |
Choosing the right preparation material is critical for passing the Fortinet NSE 7 - OT Security 7.2 exam. Here’s how our NSE7_OTS-7.2 practice test is designed to bridge the gap between knowledge and a passing score.