When performing a remote LDAP server integration with FortiAuthenticator, how do server type templates assist with the integration?
Answer : C
Server type templates in FortiAuthenticator assist LDAP integration by prepopulating the query element fields with the correct attribute and class values for the selected LDAP server type, simplifying configuration and ensuring accurate directory queries.
At a minimum, which two configurations are required to enable captive portal services on FortiAuthenticator? (Choose two.)
Answer : A, B
A pre-login service must be configured to define how users can access the portal before authentication.
A portal policy is required to determine authentication rules and behavior for captive portal access.
Which FSSO discovery method transparently detects logged off users without having to rely on external features such as WMI polling?
Answer : B
The FortiClient SSO Mobility Agent runs on the endpoint and communicates login and logoff events directly to FortiAuthenticator, allowing transparent detection of logged-off users without relying on external mechanisms like WMI polling.
When implementing FIDO2, which information, at a minimum, is stored with the service provider?
Answer : B
With FIDO2, the service provider stores at minimum the username and the FIDO2 authenticator's public key, which is used to verify authentication responses without storing sensitive private keys.
An administrator has just learned that an intermediate CA certificate signed by a FortiAuthenticator device acting as the Root CA has been compromised.
Which two steps should the administrator take to resolve the security issue? (Choose two.)
Answer : A, B
Revoking the compromised intermediate CA certificate adds it to the Root CA's CRL, preventing its further use.
All end-entity certificates issued by the compromised intermediate must be revoked, as their trust is no longer valid.
Which two statements about asymmetric cryptography are true? (Choose two.)
Answer : C, D
In asymmetric cryptography, the public key can be openly shared without compromising security.
It relies on a mathematically linked public and private key pair, where one key encrypts and the other decrypts.
You have implemented two-factor authentication to enhance security to sensitive enterprise systems.
How could you bypass the need for two-factor authentication for users accessing form specific secured networks?
Answer : A
Enabling Adaptive Authentication in the portal policy allows FortiAuthenticator to apply contextual rules, such as bypassing two-factor authentication when users connect from specific secured networks.