With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?
Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)
In which view would you find who made modifications to a Group?
Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)
| PDF + Testing Engine | 
|---|
| $57.75 | 
| Testing Engine | 
|---|
| $43.75 | 
| PDF (Q&A) | 
|---|
| $36.75 | 
| Fortinet Free Exams | 
|---|
|   |