Which of the following settings and protocols can be used to provide secure and restrictive administrative access to FortiGate?

Which of the following settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)
A. Trusted host
B. HTTPS
C. Trusted authentication
D. SSH
E. FortiTelemetry

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.