A device or user identity cannot be established transparently, such as with non-domain BYOD devices, and allow users to create their own credentials.
In this case, which user identity discovery method can FortiAuthenticator use?
Correct Answer:
C
🗳️
What are three key features of FortiAuthenticator? (Choose three.)
Correct Answer:
CDE
🗳️
Which two capabilities does FortiAuthenticator offer when acting as a self-signed or local CA? (Choose two.)
Correct Answer:
BD
🗳️
Which two are supported captive or guest portal authentication methods? (Choose two.)
Correct Answer:
AB
🗳️