Operational Technology Access Control Quiz
23 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which authentication method can be used to add an extra layer of authentication for critical assets access and VPNs in O.T networks?

  • Two-factor authentication (correct)
  • Local authentication
  • Server-based authentication
  • Passive authentication
  • Which protocol can be used to connect to a remote server for server-based authentication in FortiGate?

  • RADIUS (correct)
  • SSH
  • FTP
  • SMTP
  • In which size of O.T network can local authentication be used to implement access control?

  • Global O.T networks
  • Enterprise-level O.T networks
  • Mid-to-large size O.T networks
  • Smaller O.T networks with a limited number of users (correct)
  • Which authentication method relies on a remote server to authenticate users in FortiGate?

    <p>Server-based authentication</p> Signup and view all the answers

    Which type of authentication requires the user to manually enter credentials whenever authentication is necessary?

    <p>Active Authentication</p> Signup and view all the answers

    Which method can be used to achieve passive authentication in FortiGate?

    <p>FSSO</p> Signup and view all the answers

    Which authentication method can be used with an existing method and requires a token or certificate on top of username and password?

    <p>Two-factor authentication</p> Signup and view all the answers

    Which authentication method can be used to store a username and password on FortiGate?

    <p>Local authentication</p> Signup and view all the answers

    Which method is known as passive authentication?

    <p>Single sign-on</p> Signup and view all the answers

    Which method can save firewall resources by using an external authentication server or FortiAuthenticator?

    <p>Server-based authentication</p> Signup and view all the answers

    Which authentication method requires the user to enter their credentials every time before being granted access?

    <p>Active Authentication</p> Signup and view all the answers

    Which method can be used to add an extra layer of authentication for VPNs in O.T networks?

    <p>Two-factor authentication</p> Signup and view all the answers

    What can be used to achieve access control in an O.T network?

    <p>FortiAuthenticator or FortiGate</p> Signup and view all the answers

    What is the main motive behind achieving access control in an O.T environment?

    <p>To access the assets easily and securely</p> Signup and view all the answers

    What can FortiGate be used as in terms of access control in an O.T network?

    <p>Authentication server</p> Signup and view all the answers

    For smaller O.T networks with a limited number of users, what method of firewall authentication can be used?

    <p>Local authentication: Username and password stored locally on FortiGate</p> Signup and view all the answers

    What can be used to provide operators access to their allowed applications easily and securely in an O.T environment?

    <p>Implementing access control</p> Signup and view all the answers

    What can be used to achieve ease of use, flexibility, and security in access control for O.T networks?

    <p>Role-based access control</p> Signup and view all the answers

    What can be used to authenticate users in a smaller O.T network without the need for an external authentication server?

    <p>FortiGate</p> Signup and view all the answers

    What can be used to implement access control in a smaller O.T network with a limited number of users?

    <p>FortiGate</p> Signup and view all the answers

    What can be used to create user profiles for authentication on a FortiGate device?

    <p>FortiGate</p> Signup and view all the answers

    What can be used to achieve secure VPN with conditional access in an O.T network?

    <p>FortiGate</p> Signup and view all the answers

    What can be used to achieve multi-factor authentication in an O.T network?

    <p>FortiAuthenticator</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser