Access Control Device Placement Quiz
23 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Where can access control be implemented if using a FortiGate device within the zone?

  • At the zone, floor, or plant level (correct)
  • Only at the floor level
  • Only at the zone level
  • Only at the plant level
  • What needs to be placed and secured behind a firewall when using FortiAuthenticator as a remote authentication server?

  • FortiGate and FortiAuthenticator
  • Only FortiAuthenticator
  • FortiAuthenticator and any other authentication servers for O.T (correct)
  • Only the authentication servers for O.T
  • In the Purdue model, where can the authentication servers be implemented under the protection of the Edge-FortiGate?

  • FortiAuthenticator (correct)
  • FortiGate
  • Any authentication server
  • Remote authentication server
  • What can be used for remote users for VPN authentication on the Edge-FortiGate?

    <p>Two-factor authentication</p> Signup and view all the answers

    What is recommended in most cases regarding the use of a separate authentication server from O.T?

    <p>Using a separate authentication server from O.T</p> Signup and view all the answers

    What can FortiGate be configured for if using remote authentication within the zone?

    <p>Remote authentication and access control</p> Signup and view all the answers

    What can be restricted by using FortiGate within the zone, floor, or plant?

    <p>Traffic for critical assets</p> Signup and view all the answers

    What can be used in the policy to implement access control in the whole O.T network?

    <p>FSSO</p> Signup and view all the answers

    What can FortiAuthenticator be used as for the entire O.T network if placed under the protection of the Edge-FortiGate?

    <p>Remote authentication server</p> Signup and view all the answers

    What is recommended when using FortiAuthenticator and any other authentication servers for O.T?

    <p>Securing them behind a firewall</p> Signup and view all the answers

    What is used for the entire O.T network if using FSSO in the policy to implement access control?

    <p>FSSO</p> Signup and view all the answers

    What are the authentication methods configured in FortiAuthenticator?

    <p>FSSO, RADIUS, two-factor authentication with tokens, and L-DAP tree</p> Signup and view all the answers

    What type of authentication is configured on Edge-FortiGate?

    <p>VPN with two-factor authentication</p> Signup and view all the answers

    What does FortiNAC provide in an O.T environment?

    <p>Visibility and control</p> Signup and view all the answers

    What does FortiNAC enable in terms of network access?

    <p>Granular device identification enables thinly sliced networks</p> Signup and view all the answers

    What is the purpose of network micro-segmentation in FortiNAC?

    <p>Devices have only the access they require</p> Signup and view all the answers

    What is the second part (after visibility) to securing a network environment according to the text?

    <p>Controlling network access</p> Signup and view all the answers

    What is the purpose of creating granular policies in network access control?

    <p>To assign each endpoint exactly the access it needs to perform its job</p> Signup and view all the answers

    What is the benefit of knowing and trusting each endpoint in a network environment?

    <p>Creating granular policies for access control</p> Signup and view all the answers

    What is the role of FortiToken in the network environment?

    <p>Shared and used by multiple firewalls, not limited to one firewall or an H-A pair</p> Signup and view all the answers

    What type of access is granted to endpoints in the network environment?

    <p>Access is granted only to endpoints that are designated as trusted and secure</p> Signup and view all the answers

    What can be dynamically adjusted in the network environment according to the text?

    <p>Network access based on changes at the device level</p> Signup and view all the answers

    What is the function of network access policies in the network environment?

    <p>To assign each endpoint exactly the access it needs to perform its job</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser