Examine the screenshot shown in the exhibit.
Which two statements regarding the configuration are true? (Choose two.)
Answer : BC
An administrator is integrating FortiAuthenticator with an existing RADIUS server with the intent of eventually replacing the RADIUS server with FortiAuthenticator.
How can FortiAuthenticator help facilitate this process?
Answer : A
You are an administrator for a large enterprise and you want to delegate the creation and management of guest users to a group of sponsors.
How would you associate the guest accounts with individual sponsors?
Answer : B
You are a Wi-Fi provider and host multiple domains.
How do you delegate user accounts, user groups and permissions per domain when they are authenticating on a single FortiAuthenticator device?
Answer : C
You have implemented two-factor authentication to enhance security to sensitive enterprise systems.
How could you bypass the need for two-factor authentication for users accessing form specific secured networks?
Answer : B
Which network configuration is required when depioying FortiAuthenticator for portal services?
Answer : B
You are a FortiAuthenticator administrator for a large organization. Users who are configured to use FortiToken 200 for two-factor authentication can no longer authenticate. You have verified that only the users with two-factor authentication are experiencing the issue.
What can cause this issue?
Answer : C
Why would you configure an OCSP responder URL in an end-entity certificate?
Answer : C
An administrator wants to keep local CA cryptographic keys stored in a central location.
Which FortiAuthenticator feature would provide this functionality?
Answer : C
Which option correctly describes an SP-initiated SSO SAML packet flow for a host without a SAML assertion?
Answer : C
Which two types of digital certificates can you create in FortiAuthenticator? (Choose two.)
Answer : AC
Which EAP method is known as the outer authentication method?
Answer : D
You want to monitor FortiAuthenticator system information and receive FortiAuthenticator traps through SNMP.
Which two configurations must be performed after enabling SNMP access on the FortiAuthenticator interface? (Choose two.)
Answer : BC
Which two features of FortiAuthenticator are used for EAP deployment? (Choose two.)
Answer : AC