You want to automate some tasks in your OT network. Which three configurations are directly available in a new basic event handler on FortiAnalyzer? (Choose three answers)
Refer to the exhibit.

Why is the OT View tab not available in the Asset Identity Center section of the FortiGate-1 device? (Choose one answer)
Refer to the exhibit.

Which statement about this partial Asset Identity List page is correct? (Choose one answer)
Refer to the exhibits.

A partial Basic Event Handler page on FortiAnalyzer and the creation of a trigger in a FortiGate device are shown. To improve the protection of your OT network, you want to automate the handling of compromised devices notified through FortiAnalyzer. You have configured an event handler named Alert_trigger as shown in the exhibit. When you create the trigger on the FortiGate device, the Event handler name field does not provide the Alert_trigger option. What two actions must you perform to make the Alert_trigger option available? (Choose two answers)
Refer to the exhibit.

The OT devices behind the ruggedized FortiGate have vulnerabilities and you want to apply a virtual patching profile in the firewall policy. Why is Virtual Patching not available in the Security Profiles section? (Choose one answer)
Refer to the exhibit.

A Virtual Patching profile is shown. You have recently updated your SCADA system and would like to apply the SCADA virtual patching profile. Which two statements about this profile are correct? (Choose two answers)
What are two advantages provided by industrial Ethernet? (Choose two answers)
Refer to the exhibits.

The Playbook Monitor dashboard and the analysis of the corresponding incident analysis are shown. You created the playbook with the objective of automatically attaching the report to the incident that was created. Which two statements are correct? (Choose two answers)
Refer to the exhibit.

A partial OT network is shown. You want to configure an automated alert sent by FortiAnalyzer when an attack occurs on a FortiGate device. Which two configurations must you implement? (Choose two answers)
Refer to the exhibit.

A partial Application Sensor profile is shown. When you apply this profile in firewall policy, which two statements are correct? (Choose two answers)