B. Guest user group account passwords are temporary.
Question 2
Question
Guest accounts are most commonly used for which of the following purposes?
Answer
A. To provide temporary visitor access to corporate network resources
B. To provide temporary visitor access to wireless networks
Question 3
Question
Firewall policies dictate whether a user or device can (or cannot) authenticate to a network. Which statement about firewail authentication is true?
Answer
A. Firewall policies can be configured to authenticate certificate users.
B. The order of the firewall policies always determines whether a user's credentials are determined actively or passively.
Question 4
Question
Which statement about active authentication is true?
Answer
A. Active authentication is always used before passive authentication.
B. The firewall policy must allow the HTTP, HTTPS, FTP, and/or Telnet protocols in order for the user to be prompted for credentials.
Question 5
Question
Authentication timeout
Three options for behavior:
- [blank_start]Idle (default)[blank_end]-No traffic for that amount of me
- [blank_start]Hard—Authentication[blank_end] expires after that amount of time. regardless of activity
- [blank_start]New session-Authentication[blank_end] expires if no new session is created in that amount of time
Answer
Idle (default)
Hard—Authentication
New session-Authentication
Question 6
Question
Which statements about captive portal is true?
Answer
A. Captive portal must be hosted on a FortiGate device.
B. Captive portal can exempt specific devices from authenticating.
Question 7
Question
Which statement best describes the authentication idle timeout feature on FortiGate?
Answer
A. The length of time FortiGate waits for the user to enter their authentication credentials
B. The length of time an authenticated user is allowed to remain authenticated without any packets being generated by the host device
Question 8
Question
Which command would you use to identify the IP addresses of all authenticated users?