Which of the following operations can this administrator perform?
An administrator logs into a FortiGate unit using an account which has been assigned a
super_admin profile. Which of the following operations can this administrator perform?
which of the following statements is correct?
Which of the following items would an administrator logging in using this account NOT be able to configure?
A FortiGate unit is configured with multiple VDOMs. An administrative account on the device
has been assigned a Scope value of VDOM:root. Which of the following items would an
administrator logging in using this account NOT be able to configure?
What is the effect of using CLI "config system session-ttl" to set session_ttl to 1800 seconds?
What is the effect of using CLI “config system session-ttl” to set session_ttl to 1800
seconds?
Which of the following statements is correct about how the FortiGate unit verifies username and password durin
Which of the following statements is correct about how the FortiGate unit verifies username
and password during user authentication?
Which of the following statements are correct regarding the configuration of a FortiGate unit as an SSL VPN ga
Which of the following statements are correct regarding the configuration of a FortiGate unit
as an SSL VPN gateway? (Select all that apply.)
Which of the following statements is correct about configuring web filtering overrides?
Which of the following statements is correct about configuring web filtering overrides?
Which of the following statements are correct regarding FSAE in a Windows domain environment when NTLM is
The FortiGate Server Authentication Extensions (FSAE) provide a single sign on solution to
authenticate users transparently to a FortiGate unit using credentials stored in Windows
Active Directory. Which of the following statements are correct regarding FSAE in a
Windows domain environment when NTLM is not used? (Select all that apply.)
Which of the following statements is correct regarding the use of public key cryptography in this scenario?
Bob wants to send Alice a file that is encrypted using public key cryptography. Which of the
following statements is correct regarding the use of public key cryptography in this
scenario?