Which configuration objects can be selected for the Source field of a firewall policy? (Choose two.)
View the exhibit.Which users and user groups are allowed access to the network through captive portal?
NGFW mode allows policy-based configuration for most inspection rules. Which security profile's configuration does not change when you enable policy-based inspection?
During the digital verification process, comparing the original and fresh hash results satisfies which security requirement?
An administration wants to throttle the total volume of SMTP sessions to their email server. Which of the following DoS sensors can be used to achieve this?
What files are sent to FortiSandbox for inspection in flow-based inspection mode?