Briefing Fortinet Knowledge

Which of the following settings and protocols can be used to provide secure and restrictive administ

Which of the following settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)

A. Trusted host

B. HTTPS

C. Trusted authentication

D. SSH

E. FortiTelemetry