23 Questions
Which authentication method can be used to add an extra layer of authentication for critical assets access and VPNs in O.T networks?
Two-factor authentication
Which protocol can be used to connect to a remote server for server-based authentication in FortiGate?
RADIUS
In which size of O.T network can local authentication be used to implement access control?
Smaller O.T networks with a limited number of users
Which authentication method relies on a remote server to authenticate users in FortiGate?
Server-based authentication
Which type of authentication requires the user to manually enter credentials whenever authentication is necessary?
Active Authentication
Which method can be used to achieve passive authentication in FortiGate?
FSSO
Which authentication method can be used with an existing method and requires a token or certificate on top of username and password?
Two-factor authentication
Which authentication method can be used to store a username and password on FortiGate?
Local authentication
Which method is known as passive authentication?
Single sign-on
Which method can save firewall resources by using an external authentication server or FortiAuthenticator?
Server-based authentication
Which authentication method requires the user to enter their credentials every time before being granted access?
Active Authentication
Which method can be used to add an extra layer of authentication for VPNs in O.T networks?
Two-factor authentication
What can be used to achieve access control in an O.T network?
FortiAuthenticator or FortiGate
What is the main motive behind achieving access control in an O.T environment?
To access the assets easily and securely
What can FortiGate be used as in terms of access control in an O.T network?
Authentication server
For smaller O.T networks with a limited number of users, what method of firewall authentication can be used?
Local authentication: Username and password stored locally on FortiGate
What can be used to provide operators access to their allowed applications easily and securely in an O.T environment?
Implementing access control
What can be used to achieve ease of use, flexibility, and security in access control for O.T networks?
Role-based access control
What can be used to authenticate users in a smaller O.T network without the need for an external authentication server?
FortiGate
What can be used to implement access control in a smaller O.T network with a limited number of users?
FortiGate
What can be used to create user profiles for authentication on a FortiGate device?
FortiGate
What can be used to achieve secure VPN with conditional access in an O.T network?
FortiGate
What can be used to achieve multi-factor authentication in an O.T network?
FortiAuthenticator
Test your knowledge of access control in Operational Technology (O.T) environments with this quiz. Explore topics such as network access control, multi-factor authentication, SSO capabilities, role-based access control, and secure VPN with conditional access. Discover how FortiAuthenticator and FortiGate can be utilized to achieve access control in O.T networks.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free