Which three of the following are components of a security rule? (Choose three.)

Which three of the following are components of a security rule? (Choose three.)A . Security StringB . MethodsC . ActionD . User or host profileE . TriggerView AnswerAnswer: A B D

December 20, 2020 No Comments READ MORE +

In which view would you find who made modifications to a Group?

In which view would you find who made modifications to a Group?A . The Event Management viewB . The Security Events viewC . The Alarms viewD . The Admin Auditing viewView AnswerAnswer: B

December 18, 2020 No Comments READ MORE +

Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)

Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)A . PassiveB . DissolvableC . MobileD . PersistentView AnswerAnswer: C D

December 15, 2020 No Comments READ MORE +

How are logical networks assigned to endpoints?

How are logical networks assigned to endpoints?A . Through device profiling rulesB . Through network access policiesC . Through Layer 3 polling configurationsD . Through FortiGate IPv4 policiesView AnswerAnswer: D

December 14, 2020 No Comments READ MORE +