Which three of the following are components of a security rule? (Choose three.)
Which three of the following are components of a security rule? (Choose three.)A . Security StringB . MethodsC . ActionD . User or host profileE . TriggerView AnswerAnswer: A B D
In which view would you find who made modifications to a Group?
In which view would you find who made modifications to a Group?A . The Event Management viewB . The Security Events viewC . The Alarms viewD . The Admin Auditing viewView AnswerAnswer: B
Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)
Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)A . PassiveB . DissolvableC . MobileD . PersistentView AnswerAnswer: C D
How are logical networks assigned to endpoints?
How are logical networks assigned to endpoints?A . Through device profiling rulesB . Through network access policiesC . Through Layer 3 polling configurationsD . Through FortiGate IPv4 policiesView AnswerAnswer: D