Podcast
Questions and Answers
Where can access control be implemented if using a FortiGate device within the zone?
Where can access control be implemented if using a FortiGate device within the zone?
- At the zone, floor, or plant level (correct)
- Only at the floor level
- Only at the zone level
- Only at the plant level
What needs to be placed and secured behind a firewall when using FortiAuthenticator as a remote authentication server?
What needs to be placed and secured behind a firewall when using FortiAuthenticator as a remote authentication server?
- FortiGate and FortiAuthenticator
- Only FortiAuthenticator
- FortiAuthenticator and any other authentication servers for O.T (correct)
- Only the authentication servers for O.T
In the Purdue model, where can the authentication servers be implemented under the protection of the Edge-FortiGate?
In the Purdue model, where can the authentication servers be implemented under the protection of the Edge-FortiGate?
- FortiAuthenticator (correct)
- FortiGate
- Any authentication server
- Remote authentication server
What can be used for remote users for VPN authentication on the Edge-FortiGate?
What can be used for remote users for VPN authentication on the Edge-FortiGate?
What is recommended in most cases regarding the use of a separate authentication server from O.T?
What is recommended in most cases regarding the use of a separate authentication server from O.T?
What can FortiGate be configured for if using remote authentication within the zone?
What can FortiGate be configured for if using remote authentication within the zone?
What can be restricted by using FortiGate within the zone, floor, or plant?
What can be restricted by using FortiGate within the zone, floor, or plant?
What can be used in the policy to implement access control in the whole O.T network?
What can be used in the policy to implement access control in the whole O.T network?
What can FortiAuthenticator be used as for the entire O.T network if placed under the protection of the Edge-FortiGate?
What can FortiAuthenticator be used as for the entire O.T network if placed under the protection of the Edge-FortiGate?
What is recommended when using FortiAuthenticator and any other authentication servers for O.T?
What is recommended when using FortiAuthenticator and any other authentication servers for O.T?
What is used for the entire O.T network if using FSSO in the policy to implement access control?
What is used for the entire O.T network if using FSSO in the policy to implement access control?
What are the authentication methods configured in FortiAuthenticator?
What are the authentication methods configured in FortiAuthenticator?
What type of authentication is configured on Edge-FortiGate?
What type of authentication is configured on Edge-FortiGate?
What does FortiNAC provide in an O.T environment?
What does FortiNAC provide in an O.T environment?
What does FortiNAC enable in terms of network access?
What does FortiNAC enable in terms of network access?
What is the purpose of network micro-segmentation in FortiNAC?
What is the purpose of network micro-segmentation in FortiNAC?
What is the second part (after visibility) to securing a network environment according to the text?
What is the second part (after visibility) to securing a network environment according to the text?
What is the purpose of creating granular policies in network access control?
What is the purpose of creating granular policies in network access control?
What is the benefit of knowing and trusting each endpoint in a network environment?
What is the benefit of knowing and trusting each endpoint in a network environment?
What is the role of FortiToken in the network environment?
What is the role of FortiToken in the network environment?
What type of access is granted to endpoints in the network environment?
What type of access is granted to endpoints in the network environment?
What can be dynamically adjusted in the network environment according to the text?
What can be dynamically adjusted in the network environment according to the text?
What is the function of network access policies in the network environment?
What is the function of network access policies in the network environment?