With enforcement for network access policies and at-risk hosts enabled, what will happen if a host matches a network access policy and has a state of "at risk"?
Which two policy types can be created on a FortiNAC Control Manager? (Choose two.)
In which view would you find who made modifications to a Group?
Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Fortinet Free Exams |
---|
![]() |