Question 56
Which two statements about IPsec authentication on FortiGate are correct? (Choose two.)
Question 57
If Internet Service is already selected as Source in a firewall policy, which other configuration objects can be added to the Source field of a firewall policy?
Question 58
What are two features of the NGFW profile-based mode? (Choose two.)
Question 59
Which two statements are true about the FGCP protocol? (Choose two.)
Question 60
Refer to the exhibit.
Which algorithm does SD-WAN use to distribute traffic that does not match any of the SD-WAN rules?
