Which of the following settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)
If traffic matches a DLP filter with the action set to Quarantine IP Address, what action does the FortiGate take?
How can a browser trust a web-server certificate signed by a third party CA?
How does FortiGate verify the login credentials of a remote LDAP user?
An administrator has enabled proxy-based antivirus scanning and configured the following settings:Which statement about the above configuration is true?
A FortiGate interface is configured with the following commands:What statements about the configuration are correct? (Choose two.)