Which statements about IP-based explicit proxy authentication are true?

Which statements about IP-based explicit proxy authentication are true? (Choose two.) Response:A . IP-based authentication is best suited to authenticating users behind a NAT device.B . Sessions from the same source address are treated as a single user.C . IP-based authentication consumes less FortiGate’s memory than session-based authentication.D . FortiGate remembers authenticated sessions using...

Which statements about the firmware upgrade process on an active-active high availability (HA) cluster are true?

Which statements about the firmware upgrade process on an active-active high availability (HA) cluster are true? (Choose two.) Response:A . The firmware image must be manually uploaded to each FortiGate.B . Only secondary FortiGate devices are rebooted.C . Uninterruptable upgrade is enabled by default.D . Traffic load balancing is temporally disabled while upgrading the...

An administrator needs to inspect all web traffic (including Internet web traffic) coming from users connecting to SSL VPN. How can this be achieved?

An administrator needs to inspect all web traffic (including Internet web traffic) coming from users connecting to SSL VPN. How can this be achieved? Response:A . Disabling split tunnelingB . Configuring web bookmarksC . Assigning public IP addresses to SSL VPN clientsD . Using web-only mode View Answer Answer: A...