Which of the following are valid authentication user group types on a FortiGate unit?
Which of the following are valid authentication user group types on a FortiGate unit? (Select
all that apply.)
Which of the following statements regarding overrides are correct?
Users may require access to a web site that is blocked by a policy. Administrators can give
users the ability to override the block. Which of the following statements regarding overrides
are correct? (Select all that apply.)
Which of the following statements regarding overrides is NOT correct?
Users may require access to a web site that is blocked by a policy. Administrators can give
users the ability to override the block. Which of the following statements regarding overrides
is NOT correct?
What must the user have for a successful authentication?
An administrator has configured a FortiGate unit so that end users must authenticate
against the firewall using digital certificates before browsing the Internet. What must the
user have for a successful authentication? (Select all that apply.)
Which of the following are valid authentication protocols that can be used when a user authenticates to the RA
The FortiGate unit can be configured to allow authentication to a RADIUS server. The
RADIUS server can use several different authentication protocols during the authentication
process. Which of the following are valid authentication protocols that can be used when a
user authenticates to the RADIUS server? (Select all that apply.)
Which of the following are valid components of the Fortinet Server Authentication Extensions (FSAE)?
Which of the following are valid components of the Fortinet Server Authentication
Extensions (FSAE)? (Select all that apply.)
Which one of the following statements is correct regarding the use of web-only mode SSL VPN?
A client can create a secure connection to a FortiGate using SSL VPN in web-only mode.
Which one of the following statements is correct regarding the use of web-only mode SSL
VPN?
Which of the following statements are correct regarding the use of tunnel mode SSL VPN?
A FortiGate unit can create a secure connection to a client using SSL VPN in tunnel mode.
Which of the following statements are correct regarding the use of tunnel mode SSL VPN?
(Select all that apply.)
Which of the following configuration steps must be performed on both FortiGate units to support this configura
In an IPSec gateway-to-gateway configuration, two FortiGate units create a VPN tunnel
between two separate private networks. Which of the following configuration steps must be
performed on both FortiGate units to support this configuration? (Select all that apply.)
How is traffic routed onto an SSL VPN tunnel from the FortiGate unit side?
How is traffic routed onto an SSL VPN tunnel from the FortiGate unit side?