Which three settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)

Which three settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)

A. SSH

B. FortiTelemetry

C. Trusted host

D. HTTPS

E. Trusted authentication

Answer: A,C,D

Explanation:

To provide secure and restrictive administrative access to FortiGate, the following three settings and protocols can be used:

A. SSH (Secure Shell)

SSH is a secure protocol that allows secure remote access to the FortiGate command-line interface (CLI).

C. Trusted host

Configuring trusted hosts allows you to restrict administrative access to specified IP addresses, providing an additional layer of security.

D. HTTPS (Hypertext Transfer Protocol Secure)

HTTPS is a secure protocol that enables secure access to the FortiGate web-based graphical user interface (GUI).

So, the correct choices are A, C, and D.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments