Access Control Device Placement Quiz
23 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Where can access control be implemented if using a FortiGate device within the zone?

  • At the zone, floor, or plant level (correct)
  • Only at the floor level
  • Only at the zone level
  • Only at the plant level

What needs to be placed and secured behind a firewall when using FortiAuthenticator as a remote authentication server?

  • FortiGate and FortiAuthenticator
  • Only FortiAuthenticator
  • FortiAuthenticator and any other authentication servers for O.T (correct)
  • Only the authentication servers for O.T

In the Purdue model, where can the authentication servers be implemented under the protection of the Edge-FortiGate?

  • FortiAuthenticator (correct)
  • FortiGate
  • Any authentication server
  • Remote authentication server

What can be used for remote users for VPN authentication on the Edge-FortiGate?

<p>Two-factor authentication (C)</p> Signup and view all the answers

What is recommended in most cases regarding the use of a separate authentication server from O.T?

<p>Using a separate authentication server from O.T (C)</p> Signup and view all the answers

What can FortiGate be configured for if using remote authentication within the zone?

<p>Remote authentication and access control (D)</p> Signup and view all the answers

What can be restricted by using FortiGate within the zone, floor, or plant?

<p>Traffic for critical assets (A)</p> Signup and view all the answers

What can be used in the policy to implement access control in the whole O.T network?

<p>FSSO (C)</p> Signup and view all the answers

What can FortiAuthenticator be used as for the entire O.T network if placed under the protection of the Edge-FortiGate?

<p>Remote authentication server (A)</p> Signup and view all the answers

What is recommended when using FortiAuthenticator and any other authentication servers for O.T?

<p>Securing them behind a firewall (C)</p> Signup and view all the answers

What is used for the entire O.T network if using FSSO in the policy to implement access control?

<p>FSSO (C)</p> Signup and view all the answers

What are the authentication methods configured in FortiAuthenticator?

<p>FSSO, RADIUS, two-factor authentication with tokens, and L-DAP tree (B)</p> Signup and view all the answers

What type of authentication is configured on Edge-FortiGate?

<p>VPN with two-factor authentication (A)</p> Signup and view all the answers

What does FortiNAC provide in an O.T environment?

<p>Visibility and control (C)</p> Signup and view all the answers

What does FortiNAC enable in terms of network access?

<p>Granular device identification enables thinly sliced networks (D)</p> Signup and view all the answers

What is the purpose of network micro-segmentation in FortiNAC?

<p>Devices have only the access they require (B)</p> Signup and view all the answers

What is the second part (after visibility) to securing a network environment according to the text?

<p>Controlling network access (D)</p> Signup and view all the answers

What is the purpose of creating granular policies in network access control?

<p>To assign each endpoint exactly the access it needs to perform its job (D)</p> Signup and view all the answers

What is the benefit of knowing and trusting each endpoint in a network environment?

<p>Creating granular policies for access control (C)</p> Signup and view all the answers

What is the role of FortiToken in the network environment?

<p>Shared and used by multiple firewalls, not limited to one firewall or an H-A pair (B)</p> Signup and view all the answers

What type of access is granted to endpoints in the network environment?

<p>Access is granted only to endpoints that are designated as trusted and secure (A)</p> Signup and view all the answers

What can be dynamically adjusted in the network environment according to the text?

<p>Network access based on changes at the device level (D)</p> Signup and view all the answers

What is the function of network access policies in the network environment?

<p>To assign each endpoint exactly the access it needs to perform its job (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser