Pre-Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

NSE6_OTS_AR-7.6 Sample Questions Answers

Questions 4

You want to automate some tasks in your OT network. Which three configurations are directly available in a new basic event handler on FortiAnalyzer? (Choose three answers)

Options:

A.

Send alert email

B.

Create a report

C.

Quarantine an attacker

D.

Automatically create an incident

E.

Automation stitch

Buy Now
Questions 5

Refer to the exhibit.

A partial OT network is shown. You want to configure an automated alert sent by FortiAnalyzer when an attack occurs on a FortiGate device. Which two configurations must you implement? (Choose two answers)

Options:

A.

You must configure a stitch on the root FortiGate.

B.

You must configure a LOCALHOST task in the FortiAnalyzer playbook.

C.

You must configure an intrusion prevention security profile on all FortiGate devices.

D.

You must configure an event handler on FortiAnalyzer.

Buy Now
Questions 6

Refer to the exhibit.

A partial Application Sensor profile is shown. When you apply this profile in firewall policy, which two statements are correct? (Choose two answers)

Options:

A.

OT signatures are enabled.

B.

All OT protocols are monitored.

C.

Modbus write commands are blocked.

D.

A log is provided for each Modbus read holding registers command.

Buy Now
Questions 7

Refer to the exhibit.

The Core Network Security Connectors page of the FortiGate-2 device is shown. Which statement is correct? (Choose one answer)

Options:

A.

FortiGate-2 serves as Fabric Root.

B.

You must enable Security Fabric Connection on the FortiGate-2 interface.

C.

You must configure the FortiAnalyzer settings on FortiGate-2.

D.

FortiGate-2 is not authorized on the root FortiGate.

Buy Now
Questions 8

Refer to the exhibit.

A Logical Topology page of a FortiGate device is shown. Your OT company wants to gain visibility into the network. You decide to implement device detection with the Security Fabric. Based on the exhibit, which statement is correct? (Choose one answer)

Options:

A.

Device Detection is enabled on the other identified device.

B.

The other identified device must be authorized on the root FortiGate.

C.

The other identified device must be authorized on FortiAnalyzer.

D.

Device Detection is enabled on port3.

Buy Now
Questions 9

What is the main OT component for monitoring and controlling industrial processes? (Choose one answer)

Options:

A.

Programmable Logical Controller (PLC)

B.

Supervisory Control and Data Acquisition (SCADA)

C.

Industrial Control System (ICS)

D.

Industrial Internet of Things (IIoT)

Buy Now
Questions 10

Refer to the exhibit.

An industrial Ethernet protocol skipping layers 3 to 6 is shown. Which industrial Ethernet protocol is it? (Choose one answer)

Options:

A.

POWERLINK

B.

Ethernet over industrial protocol

C.

Modbus

D.

EtherCAT

Buy Now
Questions 11

For the installation of your first FortiGate device, you want to minimize the impact in your OT network. Therefore, you deploy it initially as an offline IDS. Which two statements about this deployment are correct? (Choose two answers)

Options:

A.

The FortiGate device acts as a network sensor.

B.

The cybersecurity visibility increases with the security profiles.

C.

Attacks, including zero-day attacks, are blocked.

D.

OT traffic flows through the FortiGate device.

Buy Now
Questions 12

You want to protect OT devices that are not updated against known vulnerabilities so you apply virtual patching to the firewall policies. What must you check to confirm that the OT devices are virtually patched? (Choose one answer)

Options:

A.

The output of the CLI command get virtual-patch profile

B.

The OT View page

C.

The output of the CLI command get rule otvp status

D.

The Asset Identity List page

Buy Now
Questions 13

Refer to the exhibit.

A Virtual Patching profile is shown. You have recently updated your SCADA system and would like to apply the SCADA virtual patching profile. Which two statements about this profile are correct? (Choose two answers)

Options:

A.

Only the vulnerability Schneider.Electric.ClearSCADA.HTTP.Interface.XSS is still present.

B.

Low severity signatures are not blocked for the device with the MAC address 12:12:12:12:12.

C.

This profile blocks critical severity signatures for all the devices.

D.

The device with the MAC address 11:11:11:11:11 is considered to have no vulnerabilities.

Buy Now
Exam Code: NSE6_OTS_AR-7.6
Exam Name: Fortinet NSE 6 - OT Security 7.6 Architect
Last Update: May 24, 2026
Questions: 45
$64.4  $183.99
$49.35  $140.99
$44.8  $127.99
buy now NSE6_OTS_AR-7.6