An OT supervisor has configured LDAP and FSSO for the authentication. The goal is that all the users be authenticated against passive authentication first and, if passive authentication is not successful, then users should be challenged with active authentication.
What should the OT supervisor do to achieve this on FortiGate?
A. Configure a firewall policy with LDAP users and place it on the top of list of firewall policies.
B. Enable two-factor authentication with FSSO.
C. Configure a firewall policy with FSSO users and place it on the top of list of firewall policies.
D. Under config user settings configure set auth-on-demand implicit.
Explanation:
The question describes a requirement for passive authentication (which does not interrupt the user) to be attempted first, followed by active authentication (which challenges the user) if passive fails. FSSO is a passive authentication method, while LDAP challenge is an active method. The correct approach is to prioritize the firewall policy using the passive method (FSSO) so it is evaluated first by the FortiGate's policy lookup, which processes rules from top to bottom.
Correct Option:
C. Configure a firewall policy with FSSO users and place it on the top of list of firewall policies.
FortiGate matches traffic against firewall policies sequentially from top to bottom. By placing the FSSO (passive) policy above the LDAP (active) policy, the FortiGate first attempts transparent, passive authentication. Only if the user is not identified via FSSO will traffic fall through to the lower policy requiring active LDAP authentication, fulfilling the requirement.
Incorrect Options:
A. Configure a firewall policy with LDAP users and place it on the top of list of firewall policies.
Placing the active LDAP policy on top would challenge all users immediately, bypassing the desired passive FSSO check first. This defeats the goal of transparent initial authentication.
B. Enable two-factor authentication with FSSO.
Two-factor authentication adds a second verification step but does not inherently define the order of passive vs. active methods. The core issue is the sequence of authentication method evaluation, which is controlled by firewall policy order, not 2FA settings.
D. Under config user settings configure set auth-on-demand implicit.
The auth-on-demand setting is for web proxy explicit authentication modes and is not relevant for controlling the sequence between FSSO (passive) and LDAP (active) authentication in regular firewall policies. The solution requires policy ordering.
Reference:
Fortinet NSE7_OTS Study Guide and FortiGate administration documentation on configuring firewall authentication sequences. The principle relies on the fundamental FortiGate firewall policy lookup order and the nature of FSSO as a passive collector.
In a wireless network integration, how does FortiNAC obtain connecting MAC address information?
A. RADIUS
B. Link traps
C. End station traffic monitoring
D. MAC notification traps
Explanation:
FortiNAC primarily uses the RADIUS protocol for seamless integration with wireless networks, specifically to obtain the connecting client's MAC address and enforce network access control policies. When a wireless client attempts to connect to an Access Point (AP)/Controller, the AP/Controller acts as a Network Access Server (NAS). It forwards authentication requests, which contain the client's MAC address, to FortiNAC acting as the RADIUS server. This critical interaction allows FortiNAC to identify the device and apply the correct network policies (e.g., VLAN assignment).
Correct Option:
A. RADIUS
The RADIUS (Remote Authentication Dial-In User Service) protocol is the standardized method for Authentication, Authorization, and Accounting (AAA) in 802.1X and MAC Authentication Bypass (MAB) environments. When a device connects:
The Access Point (AP) sends a RADIUS Access-Request message to FortiNAC.
This message includes the client's MAC address in the Calling-Station-Id RADIUS attribute.
FortiNAC processes this request, uses the MAC address to look up the host in its database, determines its security posture, and returns an Access-Accept or Access-Reject with enforcement details (like VLAN ID) to the AP.
Incorrect Options:
B. Link traps:
Link traps (SNMP notifications) are primarily used to notify FortiNAC when an interface on a switch changes its state (e.g., linkUp or linkDown). While useful for wired port state monitoring, they do not inherently provide the specific client MAC address that is connecting on a wireless AP or controller, making them less suitable for the initial device identification in a wireless context.
C. End station traffic monitoring:
While FortiNAC can gather information by monitoring network traffic (e.g., DHCP, ARP) to profile devices, this is a passive method and is often a secondary or supplemental mechanism. For initial network access control and enforcement in a wireless setting, the active authentication/authorization process via RADIUS is the primary and most reliable method to obtain the connecting MAC address.
D. MAC notification traps:
Similar to general link traps, MAC notification traps (like newMacTrap) are often associated with wired switches informing the NAC system that a new MAC address has appeared on a port. However, FortiNAC is specifically configured to rely on the RADIUS exchange from wireless controllers/APs for host visibility, as the RADIUS messages contain the necessary MAC and authentication context.
Reference:
Fortinet Document Library - FortiNAC Wireless Integration Guides (Referencing the FortiNAC architecture for MAC and 802.1X authentication).
When you create a user or host profile, which three criteria can you use? (Choose three.)
A. Host or user group memberships
B. Administrative group membership
C. An existing access control policy
D. Location
E. Host or user attributes
Explanation:
In Fortinet OT Security solutions (FortiGate and FortiOT), user and host profiles are primarily used in the Identity & Access Control policies to identify and classify devices and users in an OT environment. These profiles allow segmentation and policy enforcement based on identity attributes, group memberships, and detected location rather than just IP addresses.
Correct Option:
A. Host or user group memberships
Host/user group membership (e.g., Active Directory groups, RADIUS groups, or FortiGate local/FSSO groups) is one of the primary matching criteria when creating user or host profiles. This enables dynamic policy application based on group membership in OT environments.
D. Location
Location-based matching (detected via NAC, geography, or logical network segment) is explicitly supported in host and user profiles. FortiGate can determine the location of a device (e.g., plant floor, DMZ) and apply the appropriate profile and policy.
E. Host or user attributes
Host and user attributes such as OS type, device type, MAC address, certificate attributes, user role, or custom attributes collected via FortiClient or probes are commonly used as matching criteria in OT host/user profiles.
Incorrect Option:
B. Administrative group membership
Administrative group membership applies only to FortiGate administrator accounts and their privileges. It is not a valid criterion for creating user or host profiles used in access control or segmentation policies.
C. An existing access control policy
An access control policy is the result of applying a profile, not a matching criterion. You cannot use an existing policy as a condition to create or match a user/host profile.
Reference:
FortiOS 7.2 NSE 7 OT Security 7.2 Study Guide – Section “Identity and Access Management in OT”
An OT network architect must deploy a solution to protect fuel pumps in an industrial remote network. All the fuel pumps must be closely monitored from the corporate network for any temperature fluctuations.
How can the OT network architect achieve this goal?
A. Configure a fuel server on the remote network, and deploy a FortiSIEM with a single pattern temperature security rule on the corporate network.
B. Configure a fuel server on the corporate network, and deploy a FortiSIEM with a single pattern temperature performance rule on the remote network.
C. Configure a fuel server on the remote network, and deploy a FortiSIEM with a single pattern temperature performance rule on the corporate network.
D. Configure both fuel server and FortiSIEM with a single-pattern temperature performance rule on the corporate network.
Explanation:
This scenario requires collecting and analyzing temperature data from remote industrial devices (fuel pumps) for centralized monitoring. The key is to place the data collection point (the "fuel server," likely a data historian or SCADA server) locally on the OT/remote network for reliable, low-latency data acquisition from the pumps. The analytics engine (FortiSIEM) should be placed centrally on the corporate network for secure, aggregated monitoring and alerting.
Correct Option:
C. Configure a fuel server on the remote network, and deploy a FortiSIEM with a single pattern temperature performance rule on the corporate network.
This architecture is correct. The local fuel server in the OT zone collects real-time operational data. FortiSIEM, deployed centrally, receives this data (via connectors/syslog) and uses a performance rule (not a security rule) to monitor metrics like temperature for fluctuations, generating alerts for the corporate monitoring team.
Incorrect Options:
A. Configure a fuel server on the remote network, and deploy a FortiSIEM with a single pattern temperature security rule on the corporate network.
This is incorrect because monitoring for temperature fluctuations is an operational performance or safety issue, not a security threat. FortiSIEM uses performance rules for metric-based threshold monitoring (e.g., temperature), not security rules, which are for event correlation related to attacks or policy violations.
B. Configure a fuel server on the corporate network, and deploy a FortiSIEM with a single pattern temperature performance rule on the remote network.
Placing the fuel server on the corporate network is inefficient and introduces latency and reliability issues for collecting real-time data from remote OT devices across potentially constrained network links. FortiSIEM should also be centrally located.
D. Configure both fuel server and FortiSIEM with a single-pattern temperature performance rule on the corporate network.
This is incorrect for two reasons: it wrongly places the data collection server away from the source devices, and it misapplies the performance rule configuration. The performance rule is configured within FortiSIEM itself, not on the external fuel server.
Reference:
Fortinet OT Security best practices and FortiSIEM administration guides emphasize segregating data collection (in the OT zone) from centralized analysis (in the IT zone). The distinction between performance rules (for metric monitoring) and security rules (for event correlation) is fundamental in FortiSIEM's role in an OT environment.
What are two benefits of a Nozomi integration with FortiNAC? (Choose two.)
A. Enhanced point of connection details
B. Direct VLAN assignment
C. Adapter consolidation for multi-adapter hosts
D. Importation and classification of hosts
Explanation:
The integration between FortiNAC (Network Access Control) and Nozomi Networks (OT/IoT Visibility and Security) significantly enhances network visibility and security posture for Operational Technology (OT) environments. FortiNAC benefits by receiving rich, deep asset information discovered by Nozomi, which allows for better host classification. Furthermore, Nozomi's comprehensive view of OT devices, which often have multiple network interfaces (adapters), helps FortiNAC consolidate the identity of a single physical device across these various MAC addresses, ensuring consistent policy application and reducing database clutter.
Correct Options:
C. Adapter consolidation for multi-adapter hosts:
Nozomi excels at profiling and identifying complex OT devices, which often have multiple network adapters (MAC addresses) connected to the network.
Nozomi can aggregate these multiple MAC addresses under a single, unified device identity.
FortiNAC leverages this consolidated information, ensuring that policy enforcement and visibility are applied to the physical host, not just its individual interfaces, streamlining management.
D. Importation and classification of hosts:
Nozomi actively discovers and passively profiles all devices in the OT environment, providing detailed context like vendor, model, OS, and observed behavior.
FortiNAC can import this rich host inventory data directly from Nozomi.
This speeds up the process of classifying hosts in FortiNAC, immediately assigning them to appropriate security groups, and allowing for granular policy creation based on the accurate Nozomi classification.
Incorrect Options:
A. Enhanced point of connection details:
While FortiNAC does receive point-of-connection details (like switch port and VLAN) from network devices (switches/APs) via SNMP/RADIUS, the Nozomi integration doesn't primarily enhance this specific data.
Nozomi provides the identity and behavior of the host, whereas the connection details are gathered by FortiNAC's core network monitoring capabilities, making this benefit less specific to the Nozomi integration.
B. Direct VLAN assignment:
VLAN assignment is the policy enforcement action performed by FortiNAC itself, usually through RADIUS attributes sent back to the switch or AP.
The Nozomi integration provides the reason (the classification) for the assignment, but it does not perform the direct action of assigning the VLAN; that remains FortiNAC's function.
Reference:
Fortinet Document Library - FortiNAC Integrations (Specifically the documentation relating to FortiNAC and OT/IoT security vendors like Nozomi Networks, which details the use of deep asset inventory data for classification and device identity correlation).
An OT network administrator is trying to implement active authentication.
Which two methods should the administrator use to achieve this? (Choose two.)
A. Two-factor authentication on FortiAuthenticator
B. Role-based authentication on FortiNAC
C. FSSO authentication on FortiGate
D. Local authentication on FortiGate
Explanation:
Active authentication in FortiGate OT environments forces users or devices to authenticate before gaining network access (typically in NAC or 802.1X scenarios). FortiGate supports active authentication via its own local user database or by acting as a RADIUS client sending credentials to an external FortiAuthenticator that can enforce two-factor authentication (push, token, etc.).
Correct Option:
A. Two-factor authentication on FortiAuthenticator
FortiAuthenticator is commonly used as an external RADIUS server with FortiGate for active authentication. It supports strong two-factor methods (FortiToken, SMS, email, push) and is the recommended way to enforce MFA during captive portal or 802.1X active authentication in OT deployments.
D. Local authentication on FortiGate
FortiGate can perform active authentication directly using its local user database (captive portal or dot1x). Users are prompted to enter username/password stored locally on the FortiGate, making it a valid and frequently used method when an external server is not deployed.
Incorrect Option:
B. Role-based authentication on FortiNAC
FortiNAC is a separate NAC solution focused on device profiling and passive identification. It does not perform active user authentication for FortiGate; FortiGate cannot use FortiNAC as an authentication server.
C. FSSO authentication on FortiGate
Fortinet Single Sign-On (FSSO) is a passive authentication method that collects logon events from domain controllers or agents. It does not trigger active user challenges, so it cannot be used for active authentication scenarios.
Reference:
FortiOS 7.2 NSE 7 OT Security 7.2 Study Guide – “Active vs Passive Authentication in OT”
An OT administrator configured and ran a default application risk and control report in FortiAnalyzer to learn more about the key application crossing the network. However, the report output is empty despite the fact that some related real-time and historical logs are visible in the FortiAnalyzer.
What are two possible reasons why the report output was empty? (Choose two.)
A. The administrator selected the wrong logs to be indexed in FortiAnalyzer.
B. The administrator selected the wrong time period for the report.
C. The administrator selected the wrong devices in the Devices section.
D. The administrator selected the wrong hcache table for the report.
Explanation:
Generating a meaningful report in FortiAnalyzer requires the correct dataset. An empty report, despite logs being visible in real-time/historical views, typically indicates a mismatch between the report's query parameters and the available log data. The two most common reasons are selecting a time range where no relevant logs were recorded or choosing device groups or ADOMs that do not contain the logs from the specific firewall(s) generating the traffic.
Correct Options:
B. The administrator selected the wrong time period for the report.
The report is generated based on logs indexed for the specified time period. If the time frame selected (e.g., "Last 1 hour") does not align with when the relevant application traffic was logged, the report query will return empty results, even if logs exist for other times.
C. The administrator selected the wrong devices in the Devices section.
Reports can be filtered to specific devices or device groups. If the administrator runs the report against a subset of devices (or an ADOM) that does not include the actual FortiGate forwarding the application logs, the report will be empty. Logs visible in one ADOM or device view are not automatically included in reports for another.
Incorrect Options:
A. The administrator selected the wrong logs to be indexed in FortiAnalyzer.
While incorrect log indexing settings could cause missing data, the scenario states that "related real-time and historical logs are visible in the FortiAnalyzer." If the logs are visible, they are already being received and indexed correctly, ruling this out as the cause for this specific empty report.
D. The administrator selected the wrong hcache table for the report.
Standard, pre-defined FortiAnalyzer reports like the "Application Risk and Control Report" do not require manual selection of an hcache (historical cache) table. The report engine automatically queries the appropriate internal tables. This is a low-level database concept not typically a user-selectable option in the report interface for such standard reports.
Reference:
FortiAnalyzer Administration Guide on report generation, which emphasizes verifying the Report Time setting and the Device filter within the report configuration. The visibility of logs in log view confirms data is present, making time range and device scope the primary filters to check.
Which statement is correct about processing matched rogue devices by FortiNAC?
A. FortiNAC cannot revalidate matched devices.
B. FortiNAC remembers the match ng rule of the rogue device
C. FortiNAC disables matching rule of previously-profiled rogue devices.
D. FortiNAC matches the rogue device with only one device profiling rule.
Explanation:
FortiNAC's Device Profiler processes rogue hosts by evaluating them against a list of prioritized rules. The process is designed to be efficient: once a rogue host matches a specific device profiling rule, the evaluation stops, and the host is classified based on the settings of that first successful matching rule. FortiNAC does not continue to check the rogue against subsequent rules. This ensures a definite and singular device type classification, which is necessary for consistent policy enforcement and streamlined management.
Correct Option:
D. FortiNAC matches the rogue device with only one device profiling rule.
FortiNAC uses an ordered list of Device Profiling Rules. These rules are prioritized from top to bottom.
When a rogue device connects, FortiNAC evaluates it against the rules sequentially, starting from the highest priority
The processing stops immediately upon the first successful match (a "Pass" result). The device is then classified and optionally registered according to the settings of that single matching rule.
This first-match-wins logic prevents ambiguous classification and ensures determinism in applying device identity and subsequent network access policies.
Incorrect Options:
A. FortiNAC cannot revalidate matched devices:
This is incorrect. FortiNAC has a feature called Rule Confirmation (or re-validation). Once a rogue device is registered by a rule, FortiNAC can be configured to periodically revalidate (On-Connect or at a scheduled interval) that the device still matches the stored profiling rule, which acts as a safeguard against device impersonation.
B. FortiNAC remembers the matching rule of the rogue device:
This statement is true, but D is the more defining and correct statement about the processing action itself. FortiNAC remembers the rule for re-validation (confirmation) later, but the immediate processing behavior is defined by matching only one rule. If FortiNAC is forced to choose between B and D for the most correct statement about the processing behavior, D, which describes the first-match-wins logic, is the more fundamental principle of the profiling mechanism. However, since the Fortinet documentation states that FortiNAC remembers the matching rule for revalidation, this option is factually correct, but D describes the initial profiling mechanism's core function. Given the exam context, D is typically considered the correct statement defining the initial profiling logic.
C. FortiNAC disables matching rule of previously-profiled rogue devices:
This is incorrect. FortiNAC does not disable the rule; it associates the profiled device with the rule. If the device later fails the rule revalidation, FortiNAC can be configured to disable the device or mark it as non-compliant, not disable the profiling rule itself. The profiling rule remains active to profile other devices.
Reference:
Fortinet Document Library - FortiNAC Device Profiler Configuration (Specifically the sections detailing Device Profiling Process, Rule Prioritization, and Rule Confirmation/Revalidation).
When device profiling rules are enabled, which devices connected on the network are evaluated by the device profiling rules?
A. Known trusted devices, each time they change location
B. All connected devices, each time they connect
C. Rogue devices, only when they connect for the first time
D. Rogue devices, each time they connect
Explanation:
In FortiGate/FortiOS OT device detection and profiling (Device Identification & IoT/OT Detection), when device profiling rules are enabled, FortiGate continuously scans the network and only applies the profiling rules to devices classified as “rogue” (i.e., unknown or untrusted devices). Trusted/known devices are not re-evaluated by profiling rules unless manually reset.
Correct Option:
C. Rogue devices, only when they connect for the first time
FortiGate applies device profiling rules exclusively to rogue (unknown) devices during their initial discovery and fingerprinting process. Once the device is identified and moved to the known/trusted list (automatically or manually), it is no longer subject to repeated profiling rule evaluation.
Incorrect Option:
A. Known trusted devices, each time they change location
Known/trusted devices are exempt from profiling rules. Location changes do not trigger re-profiling.
B. All connected devices, each time they connect
Profiling rules are not applied to every device on every connection; only rogue devices are evaluated, and only once during initial detection.
D. Rogue devices, each time they connect
Even rogue devices are profiled only the first time they are detected. Subsequent connections of the same rogue device use the previously determined profile unless the entry is cleared.
Reference:
NSE 7 OT Security 7.2 Study Guide – Section “OT Device Detection and Profiling” (Device Identification > Profiling Rules)
How can you achieve remote access and internet availability in an OT network?
A. Create a back-end backup network as a redundancy measure.
B. Implement SD-WAN to manage traffic on each ISP link.
C. Add additional internal firewalls to access OT devices.
D. Create more access policies to prevent unauthorized access.
Explanation:
The question asks how to achieve two specific goals: remote access (likely for administrators or systems) and general internet availability for OT assets. In modern OT architectures, this is typically accomplished by connecting the OT network to one or more Internet Service Provider (ISP) links. SD-WAN is the technology used to intelligently manage and steer this traffic across multiple links for reliability, performance, and policy-based routing.
Correct Option:
B. Implement SD-WAN to manage traffic on each ISP link.
Fortinet's SD-WAN (often via FortiGate) provides the mechanism to bring internet connectivity into the OT network and manage its use. It allows for load balancing and failover across multiple ISP links for reliable internet availability. Furthermore, SD-WAN can integrate with VPNs (like IPsec or SSL VPN) to securely enable remote access for administrators, routing that specific traffic appropriately while segmenting it from regular OT traffic.
Incorrect Options:
A. Create a back-end backup network as a redundancy measure.
A backup network is a form of redundancy but does not inherently provide the initial internet connectivity or remote access capability. It is a supplementary measure that could work with an internet link, but SD-WAN is the direct solution for managing and utilizing those links.
C. Add additional internal firewalls to access OT devices.
Adding more internal firewalls relates to network segmentation and internal access control (Zero Trust), not to establishing the primary external connectivity for internet access or enabling secure remote access from outside the network. It is a security measure, not a connectivity solution.
D. Create more access policies to prevent unauthorized access.
While creating access policies is a critical security practice for controlling remote access and internet use, it is not the method to achieve that connectivity in the first place. Policies govern access once the underlying connectivity (provided by SD-WAN and internet links) is already established.
Reference:
Fortinet SD-WAN and Zero Trust Access solutions for OT environments. The Fortinet Security Fabric uses FortiGate SD-WAN capabilities to securely connect distributed OT sites to the internet and corporate network, facilitating both outbound internet access and inbound remote access via integrated VPN services.
You are investigating a series of incidents that occurred in the OT network over past 24 hours in FortiSIEM. Which three FortiSIEM options can you use to investigate these incidents? (Choose three.)
A. Security
B. IPS
C. List
D. Risk
E. Overview
Explanation:
FortiSIEM's incident investigation follows a structured workflow. The Overview dashboard provides the initial high-level context with visual widgets showing event spikes, top attackers, and geographic anomalies over the past 24 hours. From there, analysts pivot to the Risk view, which displays correlated security incidents prioritized by risk score—crucial for identifying OT-specific rule violations like unauthorized PLC access. Finally, the List view enables granular forensic analysis, allowing filtering by OT assets, protocols (Modbus/DNP3), and raw log details to determine root cause.
Why other options are incorrect:
A. Security:
Not a primary investigative pane in FortiSIEM's analyst workflow. While security events are analyzed, the interface uses Overview→Risk→List for structured investigation.
B. IPS:
This is an event source type, not an investigative interface. IPS logs appear in the List view and may trigger Risk incidents but aren't a navigation option themselves.
Reference:
FortiSIEM Analyst Guide emphasizes this three-pane methodology: "Use Overview for situational awareness, Risk for prioritized incidents, and List for event details" (FortiSIEM 6.4 Analyst Guide, Chapter 3: Investigating Events).
An administrator wants to use FortiSoC and SOAR features on a FortiAnalyzer device to detect and block any unauthorized access to FortiGate devices in an OT network. Which two statements about FortiSoC and SOAR features on FortiAnalyzer are true? (Choose two.)
A. You must set correct operator in event handler to trigger an event.
B. You can automate SOC tasks through playbooks.
C. Each playbook can include multiple triggers.
D. You cannot use Windows and Linux hosts security events with FortiSoC.
Explanation:
A. You must set correct operator in event handler to trigger an event.
In FortiSoC, event handlers rely on logical operators (AND, OR, etc.) to determine when conditions are met. If the operator is misconfigured, the event won’t trigger properly. This is fundamental to building reliable detection logic in FortiAnalyzer SOC modules.
B. You can automate SOC tasks through playbooks.
FortiAnalyzer SOAR (Security Orchestration, Automation, and Response) allows administrators to automate repetitive SOC tasks. Playbooks are central to SOAR, enabling automated workflows such as blocking IPs, quarantining endpoints, or escalating incidents. This is a key feature of FortiAnalyzer’s FortiSoC module.
❌ Why the Other Options Are Wrong
C. Each playbook can include multiple triggers. Incorrect.
A playbook in FortiAnalyzer SOAR has one trigger (e.g., an event or alert) that starts the workflow. Multiple actions can follow, but triggers are singular per playbook.
D. You cannot use Windows and Linux hosts security events with FortiSoC.
Incorrect. FortiSoC can ingest and correlate events from multiple sources, including Windows and Linux host logs, via connectors or syslog. Limiting it to exclude host events is false.
📖 Reference
Fortinet FortiAnalyzer Administration Guide – FortiSoC and SOAR features
Fortinet NSE Training (NSE7 OT Security) – SOAR playbooks and event handler configuration
| Page 1 out of 6 Pages |