A FortiGate interface is configured with the following commands:
Answer : AC
Which of the following Fortinet hardware accelerators can be used to offload flow-based antivirus inspection? (Choose two.)
Answer : AB
Under what circumstance would you enable LEARN as the Action on a firewall policy?
Answer : C
What methods can be used to deliver the token code to a user who is configured to use two-factor authentication? (Choose three.)
Answer : BCE
You are tasked to architect a new IPsec deployment with the following criteria:
- There are two HQ sites that all satellite offices must connect to.
- The satellite offices do not need to communicate directly with other satellite offices.
- No dynamic routing will be used.
- The design should minimize the number of tunnels being configured.
Which topology should be used to satisfy all of the requirements?
Answer : B