Which of the following settings and protocols can be used to provide secure and restrictive administrative access to FortiGate? (Choose three.)

A. Trusted host
B. HTTPS
C. Trusted authentication
D. SSH
E. FortiTelemetry
  Discussion forum

Question
0

Leave an answer