Question 31

Which two statements describe how the RPF check is used? (Choose two.)
  • Question 32

    View the exhibit.

    Which two behaviors result from this full (deep) SSL configuration? (Choose two.)
  • Question 33

    Which two protocols are used to enable administrator access of a FortiGate device? (Choose two.)
  • Question 34

    Which three statements are true regarding session-based authentication? (Choose three.)
  • Question 35

    Refer to the exhibit, which shows an SD-WAN zone configuration on the FortiGate GUI.

    Based on the exhibit, which statement is true?