A device or user identity cannot be established transparently, such as with non-domain BYOD devices, and allow users to create their own credentials.
In this case, which user identity discovery method can FortiAuthenticator use?
Answer : C
What are three key features of FortiAuthenticator? (Choose three.)
Answer : ADE
Which two capabilities does FortiAuthenticator offer when acting as a self-signed or local CA? (Choose two.)
Answer : BD
Which two are supported captive or guest portal authentication methods? (Choose two.)
Answer : AB
What happens when a certificate is revoked? (Choose two.)
Answer : AB
Refer to the exhibit.
Examine the screenshot shown in the exhibit.
Which two statements regarding the configuration are true? (Choose two.)
Answer : BD
Which interface services must be enabled for the SCEP client to connect to FortiAuthenticator?
Answer : B
Which two statements about the EAP-TTLS authentication method are true? (Choose two.)
Answer : BD
Which EAP method is known as the outer authentication method?
Answer : C
Which two SAMI roles can FortiAuthenticator be configured as? (Choose two.)
Answer : AD
Which two types of digital certificates can you create in FortiAuthenticator? (Choose two.)
Answer : BD
You are a FortiAuthenticator administrator for a large organization. Users who are configured to use FortiToken 200 for two-factor authentication can no longer authenticate. You have verified that only the users with two-factor authentication are experiencing the issue.
What can cause this issue?
Answer : B
How can a SAML metadata file be used?
Answer : B
Which of the following is an OATH-based standard to generate event-based, one-time password tokens?
Answer : C
You are a Wi-Fi provider and host multiple domains. How do you delegate user accounts, user groups and permissions per domain when they are authenticating on a single FortiAuthenticator device?
Answer : A