Which two features of FortiAuthenticator are used for EAP deployment? (Choose two)
A, D
Which behaviors exist for certificate revocation lists (CRLs) on FortiAuthenticator? (Choose two)
A, B
You are a FortiAuthenticator administrator for a large organization. Users who are configured to use
FortiToken 200 for two-factor authentication can no longer authenticate. You have verified that only
the users with two-factor authentication are experiencing the issue.
What can couse this issue?
D
Which two statements about the EAP-TTLS authentication method are true? (Choose two)
B, C
When you are setting up two FortiAuthenticator devices in active-passive HA, which HA role must
you select on the master FortiAuthenticator?
C
Which EAP method is known as the outer authentication method?
A
Refer to the exhibit.
Examine the screenshot shown in the exhibit.
Which two statements regarding the configuration are true? (Choose two)
A, B
Which statement about the guest portal policies is true?
D
Which two capabilities does FortiAuthenticator offer when acting as a self-signed or local CA?
(Choose two)
B, D
Which three of the following can be used as SSO sources? (Choose three)
A, C, E
You are the administrator of a large network that includes a large local user datadabase on the
current Fortiauthenticatior. You want to import all the local users into a new Fortiauthenticator
device.
Which method should you use to migrate the local users?
D
Which two types of digital certificates can you create in Fortiauthenticator? (Choose two)
A, D
What happens when a certificate is revoked? (Choose two)
C, D
Which two SAML roles can Fortiauthenticator be configured as? (Choose two)
A, D
A device or user identity cannot be established transparently, such as with non-domain BYOD
devices, and allow users to create their own credentialis.
In this case, which user idendity discovery method can Fortiauthenticator use?
D