Which of the following IKE modes is the one used during the IPsec phase 2 negotiation?
Which statement describes how traffic flows in sessions handled by a slave unit in an active- active HA cluster?
Which of the following statements is correct regarding the FortiGuard Services Web Filtering Override configuration as illustrated in the exhibit?
Which of the following options can you use to update the virus definitions on a FortiGate unit? (Select all that apply.)
Two-factor authentication is supported using the following methods? (Select all that apply.)
Which of the following FSSO modes must be used for Novell eDirectory networks?