When you create a user or host profile, which three criteria can you use? (Choose three.)
Correct Answer:ADE
Which three methods of communication are used by FortiNAC to gather visibility information? (Choose three.)
Correct Answer:ACD
An administrator wants to use FortiSoC and SOAR features on a FortiAnalyzer device to detect and block any unauthorized access to FortiGate devices in an OT network.
Which two statements about FortiSoC and SOAR features on FortiAnalyzer are true? (Choose two.)
Correct Answer:BC
Ref: https://docs.fortinet.com/document/fortianalyzer/7.0.0/administration-guide/268882/fortisoc
What triggers Layer 2 polling of infrastructure devices connected in the network?
Correct Answer:D
Refer to the exhibit, which shows a non-protected OT environment.
An administrator needs to implement proper protection on the OT network.
Which three steps should an administrator take to protect the OT network? (Choose three.)
Correct Answer:ACD
Refer to the exhibit and analyze the output.
Which statement about the output is true?
Correct Answer:A