Which three are components of a security rule? (Choose three.)
Which two device classification options can register a device automatically and transparently to the end user? (Choose two.)
An administrator is configuring FortiNAC to manage FortiGate VPN users. As part of the configuration, the administrator must configure a few FortiGate firewall policies.
What is the purpose of the FortiGate firewall policy that applies to unauthorized VPN clients?
When FortiNAC passes a firewall tag to FortiGate, what determines the value that is passed?
In a wireless integration, what method does FortiNAC use to obtain connecting MAC address information?
Which three of the following are components of a security rule? (Choose three.)
Which agent is used only as part of a login script?