At a minimum, which two configurations are required to enable guest portal services on FortiAuthenticator? (Choose two)
A. Configuring a portal policy
B. Configuring at least on post-login service
C. Configuring a RADIUS client
D. Configuring an external authentication portal
Which two statements about the EAP-TTLS authentication method are true? (Choose two)
A. Uses mutualauthentication
B. Uses digital certificates only on the server side
C. Requires an EAP server certificate
D. Support a port access control (wired) solution only
What happens when a certificate is revoked? (Choose two)
A. Revoked certificates cannot be reinstated for any reason
B. All certificates signed by a revoked CA certificate are automatically revoked
C. Revoked certificates are automatically added to the CRL
D. External CAs will priodically query Fortiauthenticator and automatically download revoked certificates
What are three key features of FortiAuthenticator? (Choose three)
A. Identity management device
B. Log server
C. Certificate authority
D. Portal services
E. RSSO Server
Which behaviors exist for certificate revocation lists (CRLs) on FortiAuthenticator? (Choose two)
A. CRLs contain the serial number of the certificate that has been revoked
B. Revoked certificates are automaticlly placed on the CRL
C. CRLs can beexported only through the SCEP server
D. All local CAs share the same CRLs
Which network configuration is required when deploying FortiAuthenticator for portal services?
A. FortiAuthenticator must have the REST API access enable on port1
B. One of the DNS servers must be a FortiGuard DNS server
C. Fortigate must be setup as default gateway for FortiAuthenticator
D. Policies must have specific ports open between FortiAuthenticator and the authentication clients
You are a FortiAuthenticator administrator for a large organization. Users who are configured to use FortiToken 200 for two-factor authentication can no longer authenticate. You have verified that only the users with two-factor authentication are experiencing the issue.
What can couse this issue?
A. On of the FortiAuthenticator devices in the active-active cluster has failed
B. FortiAuthenticator has lose contact with the FortiToken Cloud servers
C. FortiToken 200 licence has expired
D. Time drift between FortiAuthenticator and hardware tokens
Which three of the following can be used as SSO sources? (Choose three)
A. FortiClient SSO Mobility Agent
B. SSH Sessions
C. FortiAuthenticator in SAML SP role
D. Fortigate
E. RADIUS accounting
When you are setting up two FortiAuthenticator devices in active-passive HA, which HA role must you select on the masterFortiAuthenticator?
A. Active-passive master
B. Standalone master
C. Cluster member
D. Load balancing master
Which two features of FortiAuthenticator are used for EAP deployment? (Choose two)
A. Certificate authority
B. LDAP server
C. MAC authentication bypass
D. RADIUS server
Which two are supported captive or guest portal authentication methods? (Choose two)
A. Linkedln
B. Apple ID
C. Instagram
D. Email
Which two protocols are the default management access protocols for administrative access for FortiAuthenticator? (Choose two)
A. Telnet
B. HTTPS
C. SSH
D. SNMP
Which option correctly describes an SP-initiated SSO SAML packet flow for a host without a SAML assertion?
A. Service provider contacts idendity provider, idendity provider validates principal for service provider, service provider establishes communication with principal
B. Principal contacts idendity provider and is redirected to serviceprovider, principal establishes connection with service provider, service provider validates authentication with identify provider
C. Principal contacts service provider, service provider redirects principal to idendity provider, after succesfull authentication identify provider redirects principal to service provider
D. Principal contacts idendity provider and authenticates, identity provider relays principal to service provider after valid authentication
Which two statement about the RADIUS service on FortiAuthenticator are true? (Choose two)
A. Two-factor authentication cannot be enforced when using RADIUS authentication
B. RADIUS users can migrated to LDAP users
C. Only local users can be authenticated through RADIUS
D. FortiAuthenticator answers only to RADIUS client that are registered with FortiAuthenticator
Which statement about the guest portal policies is true?
A. Guest portal policies apply only to authentication requests coming from unknown RADIUS clients
B. Guest portal policies can be used only for BYODs
C. Conditions in the policy apply only to guest wireless users
D. All conditions in the policy must match before a user is presented with the guest portal