Which two of the following are required for endpoint compliance monitors? (Choose two.)
Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)
Which three of the following are components of a security rule? (Choose three.)
When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed?
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?
Which system group will force at-risk hosts into the quarantine network, based on point of connection?