Which two statements describe how the RPF check is used? (Choose two.)
Which three strategies are valid SD-WAN rule strategies for member selection? (Choose three.)
Which two features of IPsec IKEv1 authentication are supported by FortiGate? (Choose two.)
Which two statements are true regarding FortiGate HA configuration synchronization? (Choose two.)
What are two features of the NGFW profile-based mode? (Choose two.)
Refer to the exhibit.Which two statements are true about the routing entries in this database table? (Choose two.)