What are three key features of FortiAuthenticator? (Choose three.)
Which two capabilities does FortiAuthenticator offer when acting as a self-signed or local CA? (Choose two.)
Which two are supported captive or guest portal authentication methods? (Choose two.)
What happens when a certificate is revoked? (Choose two.)
Refer to the exhibit.Examine the screenshot shown in the exhibit.Which two statements regarding the configuration are true? (Choose two.)
A device or user identity cannot be established transparently, such as with non-domain BYOD devices, and allow users to create their own credentials.In this case, which user identity discovery method can FortiAuthenticator use?