Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which option correctly describes an SP-initiated SSO SAML packet flow for a host without a SAML assertion?

A.

Service provider contacts idendity provider, idendity provider validates principal for service provider, service provider establishes communication with principal

B.

Principal contacts idendity provider and is redirected to serviceprovider, principal establishes connection with service provider, service provider validates authentication with identify provider

C.

Principal contacts service provider, service provider redirects principal to idendity provider, after succesfull authentication identify provider redirects principal to service provider

D.

Principal contacts idendity provider and authenticates, identity provider relays principal to service provider after valid authentication

Full Access
Question # 5

Which FSSO discovery method transparently detects logged off users without having to rely on external features such as WMI polling?

A.

Windows AD polling

B.

FortiClient SSO Mobility Agent

C.

Radius Accounting

D.

DC Polling

Full Access
Question # 6

When you are setting up two FortiAuthenticator devices in active-passive HA, which HA role must you select on the masterFortiAuthenticator?

A.

Active-passive master

B.

Standalone master

C.

Cluster member

D.

Load balancing master

Full Access
Question # 7

Which two statements about the self-service portal are true? (Choose two)

A.

Self-registration information can be sent to the user through email or SMS

B.

Realms can be used to configure which seld-registeredusers or groups can authenticate on the network

C.

Administrator approval is required for all self-registration

D.

Authenticating users must specify domain name along with username

Full Access
Question # 8

Which two are supported captive or guest portal authentication methods? (Choose two)

A.

Linkedln

B.

Apple ID

C.

Instagram

D.

Email

Full Access
Question # 9

You want to monitor FortiAuthenticator system information and receive FortiAuthenticator traps through SNMP.

Which two configurations must be performed after enabling SNMP access on the FortiAuthenticator interface? (Choose two)

A.

Enable logging services

B.

Set the tresholds to trigger SNMP traps

C.

Upload management information base (MIB) files to SNMP server

D.

Associate an ASN, 1 mapping rule to the receiving host

Full Access