Which of the following settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)
A. Trusted host
B. HTTPS
C. Trusted authentication
D. SSH
E. FortiTelemetry
Which of the following settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)
A. Trusted host
B. HTTPS
C. Trusted authentication
D. SSH
E. FortiTelemetry