Which behaviors exist for certificate revocation lists (CRLs) on FortiAuthenticator? (Choose two)
When you are setting up two FortiAuthenticator devices in active-passive HA, which HA role must you select on the masterFortiAuthenticator?
Which two protocols are the default management access protocols for administrative access for FortiAuthenticator? (Choose two)
Which FSSO discovery method transparently detects logged off users without having to rely on external features such as WMI polling?