Which three pieces of information does FortiGate use to identify the hostname of the SSL server when SSL certificate inspection is enabled? (Choose three.)
Refer to the exhibit.Which algorithm does SD-WAN use to distribute traffic that does not match any of the SD-WAN rules?
A network administrator is configuring an IPsec VPN tunnel for a sales employee travelling abroad.Which IPsec Wizard template must the administrator apply?
Refer to the exhibits, which show the system performance output and the default configuration of high memory usage thresholds in a FortiGate.Based on the system performance output, what can be the two possible outcomes? (Choose two.)
Refer to the exhibits.The exhibits show a diagram of a FortiGate device connected to the network, as well as the firewall policy and IP pool configuration on the FortiGate device.Two PCs, PC1 and PC2, are connected behind FortiGate and can access the internet successfully. However, when the administrator adds a third PC to the network (PC3), the PC cannot connect to the internet.Based on the information shown in the exhibit, which two configuration options can the administrator use to fix the connectivity issue for PC3? (Choose two.)
Refer to the exhibit.Which two statements are true about the routing entries in this database table? (Choose two.)