Which three Fortinet products can be used for device identification in an OT industrial control system (ICS)? (Choose three.)
You are investigating a series of incidents that occurred in the OT network over past 24 hours in FortiSIEM.
Which three FortiSIEM options can you use to investigate these incidents? (Choose three.)
When you create a user or host profile, which three criteria can you use? (Choose three.)
Which three common breach points can you find in a typical OT environment? (Choose three.)