A device or user identity cannot be established transparently, such as with non-domain BYOD devices, and allow users to create their own credentials.
In this case, which user identity discovery method can FortiAuthenticator use?
Answer : C
What are three key features of FortiAuthenticator? (Choose three.)
Answer : ADE
Which two capabilities does FortiAuthenticator offer when acting as a self-signed or local CA? (Choose two.)
Answer : BD
Which two are supported captive or guest portal authentication methods? (Choose two.)
Answer : AB
What happens when a certificate is revoked? (Choose two.)
Answer : AB