Which FortiAuthenticator feature allows users to authenticate against different back-end databases when using a single RADIUS policy?
Correct : D
Realms in FortiAuthenticator allow mapping of authentication requests to different back-end databases within a single RADIUS policy, enabling user authentication across multiple directories or identity sources.
Start a Discussions
Which two capabilities does FortiAuthenticator offer when acting as a self-signed or local CA? (Choose two.)
Correct : C, D
FortiAuthenticator can import other CA certificates and CRLs for trust and validation purposes.
It can create, sign, and revoke X.509 certificates when acting as a self-signed or local CA.
Start a Discussions
You want to monitor FortiAuthenticator system information and receive FortiAuthenticator traps through SNMP.
Which two configurations must be performed after enabling SNMP access on the FortiAuthenticator interface? (Choose two.)
Correct : B, D
You must set thresholds that will trigger SNMP traps so FortiAuthenticator knows when to send alerts.
The SNMP server needs the appropriate MIB files uploaded to interpret FortiAuthenticator's SNMP data and traps correctly.
Start a Discussions
You are the administrator of a large network that includes a large local user database on the current FortiAuthenticator. You want to import all the local users into a new FortiAuthenticator device.
Which method should you use to migrate the local users?
Correct : D
The recommended method to migrate a large local user database to a new FortiAuthenticator is to export the users from the current device into a CSV file and then import that CSV file into the new FortiAuthenticator.
Start a Discussions
You have implemented two-factor authentication to enhance security to sensitive enterprise systems.
How could you bypass the need for two-factor authentication for users accessing form specific secured networks?
Correct : A
Enabling Adaptive Authentication in the portal policy allows FortiAuthenticator to apply contextual rules, such as bypassing two-factor authentication when users connect from specific secured networks.
Start a Discussions