Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Why would you configure an OCSP responder URL in an end-entity certificate?

A.

To designate the SCEP server to use for CRL updates for that certificate

B.

To identify the end point that a certificate has been assigned to

C.

To designate a server for certificate status checking

D.

To provide the CRL location for the certificate

You are an administrator for a large enterprise and you want to delegate the creation and management of guest users to a group of sponsors.

How would you associate the guest accounts with individual sponsors?

A.

As an administrator, you can assign guest groups to individual sponsors.

B.

Guest accounts are associated with the sponsor that creates the guest account.

C.

You can automatically add guest accounts to groups associated with specific sponsors.

D.

Select the sponsor on the guest portal, during registration.

You are a FortiAuthenticator administrator for a large organization. Users who are configured to use FortiToken 200 for two-factor authentication can no longer authenticate. You have verified that only the users with two-factor authentication are experiencing the issue.

What can cause this issue?

A.

FortiToken 200 license has expired

B.

One of the FortiAuthenticator devices in the active-active cluster has failed

C.

Time drift between FortiAuthenticator and hardware tokens

D.

FortiAuthenticator has lost contact with the FortiToken Cloud servers

At a minimum, which two configurations are required to enable guest portal services on FortiAuthenticator? (Choose two)

A.

Configuring a portal policy

B.

Configuring at least on post-login service

C.

Configuring a RADIUS client

D.

Configuring an external authentication portal

You are the administrator of a large network that includes a large local user datadabase on the current Fortiauthenticatior. You want to import all the local users into a new Fortiauthenticator device.

Which method should you use to migrate the local users?

A.

Import users using RADIUS accounting updates.

B.

Import the current directory structure.

C.

Import users from RADUIS.

D.

Import users using a CSV file.

You have implemented two-factor authentication to enhance security to sensitive enterprise systems.

How could you bypass the need for two-factor authentication for users accessing form specific secured networks?

A.

Create an admin realm in the authentication policy

B.

Specify the appropriate RADIUS clients in the authentication policy

C.

Enable Adaptive Authentication in the portal policy

D.

Enable the Resolve user geolocation from their IP address option in the authentication policy.

When generating a TOTP for two-factor authentication, what two pieces of information are used by the algorithm to generate the TOTP?

A.

UUID and time

B.

Time and seed

C.

Time and mobile location

D.

Time and FortiAuthenticator serial number

Which behaviors exist for certificate revocation lists (CRLs) on FortiAuthenticator? (Choose two)

A.

CRLs contain the serial number of the certificate that has been revoked

B.

Revoked certificates are automaticlly placed on the CRL

C.

CRLs can be exported only through the SCEP server

D.

All local CAs share the same CRLs

Which method is the most secure way of delivering FortiToken data once the token has been seeded?

A.

Online activation of the tokens through the FortiGuard network

B.

Shipment of the seed files on a CD using a tamper-evident envelope

C.

Using the in-house token provisioning tool

D.

Automatic token generation using FortiAuthenticator

Which two statement about the RADIUS service on FortiAuthenticator are true? (Choose two)

A.

Two-factor authentication cannot be enforced when using RADIUS authentication

B.

RADIUS users can migrated to LDAP users

C.

Only local users can be authenticated through RADIUS

D.

FortiAuthenticator answers only to RADIUS client that are registered with FortiAuthenticator