Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet Exam NSE7_OTS-7.2 Topic 1 Question 4 Discussion

Actual exam question for Fortinet's NSE7_OTS-7.2 exam
Question #: 4
Topic #: 1
[All NSE7_OTS-7.2 Questions]

An OT network consists of multiple FortiGate devices. The edge FortiGate device is deployed as the secure gateway and is only allowing remote operators to access the ICS networks on site.

Management hires a third-party company to conduct health and safety on site. The third-party company must have outbound access to external resources.

As the OT network administrator, what is the best scenario to provide external access to the third-party company while continuing to secure the ICS networks?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Sabra
4 days ago
But wouldn't configuring outbound security policies with limited active authentication users of the third-party company be a more secure option?
upvoted 0 times
...
Aileen
6 days ago
I think creating VPN tunnels between the devices could protect the ICS network traffic.
upvoted 0 times
...
Dominic
7 days ago
I think configuring outbound security policies with limited active authentication users could also help in securing the network.
upvoted 0 times
...
Mammie
11 days ago
That could work too, but it might be more complex to manage and monitor.
upvoted 0 times
...
Jackie
13 days ago
But wouldn't splitting the edge FortiGate device into multiple logical devices also work?
upvoted 0 times
...
Dominic
13 days ago
I agree with Mammie. VPN tunnels can provide secure access for the third-party company.
upvoted 0 times
...
Mammie
28 days ago
I think creating VPN tunnels would be the best scenario to protect the ICS network traffic.
upvoted 0 times
...
Ivette
1 months ago
I agree, Option C seems the most promising. Though we'll have to be really careful with the VDOM configuration to make sure there are no gaps in security. Can't have those third-party folks getting into the ICS networks, you know? *winks*
upvoted 0 times
...
Florinda
2 months ago
I agree, this is a classic security vs. accessibility dilemma. We don't want to open up the network too much, but we also need to let the third-party company do their job. Perhaps a combination of solutions could work best?
upvoted 0 times
...
Margery
2 months ago
Haha, that's a good one! I like the idea of giving them their own little domain to play in, as long as it keeps the ICS networks safe.
upvoted 0 times
...
Selma
2 months ago
Creating VPN tunnels between the downstream FortiGate devices and the edge FortiGate, as in Option B, could be a good way to protect the ICS network traffic. That way, the third-party company can access external resources without directly connecting to the ICS networks.
upvoted 0 times
Malcom
1 days ago
Option B sounds like the best solution. It would keep the ICS network traffic secure.
upvoted 0 times
...
Dusti
1 months ago
Having multiple layers of security measures can help in safeguarding the OT network and the ICS networks.
upvoted 0 times
...
Laurel
1 months ago
Configuring outbound security policies and implementing VPN tunnels seems like a good approach in this scenario.
upvoted 0 times
...
Ocie
1 months ago
It's always a priority to protect the critical infrastructure while allowing necessary external access.
upvoted 0 times
...
Lucia
1 months ago
Exactly, VPN tunnels help in achieving that balance of access and security.
upvoted 0 times
...
Chanel
1 months ago
I think it's important to ensure the third-party company can access what they need without compromising safety.
upvoted 0 times
...
Cora
1 months ago
Agreed, setting up VPN tunnels adds an extra layer of security for the traffic.
upvoted 0 times
...
Keneth
1 months ago
B sounds like a good option to protect the ICS networks while providing external access to the third-party company.
upvoted 0 times
...
...
Sarah
2 months ago
Hmm, this is a tricky one. We need to strike a balance between providing access for the third-party company while still maintaining tight security for the ICS networks. Let's weigh the pros and cons of each option.
upvoted 0 times
...
Dallas
2 months ago
You know, if we go with Option C, we could name the third-party VDOM something like 'The Island of Misfit Toys.' Just to keep things lighthearted, you know?
upvoted 0 times
...
Naomi
2 months ago
This question is really testing our understanding of OT network security best practices. We need to find a way to give the third-party company access while still keeping the ICS networks secure.
upvoted 0 times
...

Save Cancel