Which three settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)
Which three settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)
A. SSH
B. FortiTelemetry
C. Trusted host
D. HTTPS
E. Trusted authentication
Answer: A,C,D
Explanation:
To provide secure and restrictive administrative access to FortiGate, the following three settings and protocols can be used:
A. SSH (Secure Shell)
SSH is a secure protocol that allows secure remote access to the FortiGate command-line interface (CLI).
C. Trusted host
Configuring trusted hosts allows you to restrict administrative access to specified IP addresses, providing an additional layer of security.
D. HTTPS (Hypertext Transfer Protocol Secure)
HTTPS is a secure protocol that enables secure access to the FortiGate web-based graphical user interface (GUI).
So, the correct choices are A, C, and D.
Latest FCP_FGT_AD-7.4 Dumps Valid Version with 200 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund