Which three of the following are components of a security rule? (Choose three.)
Which connecting endpoints are evaluated against all enabled device profiling rules?
Which two agents can validate endpoint compliance transparently to the end user? (Choose two.)
Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)
Which group type can have members added directly from the FortiNAC Control Manager?
Refer to the exhibit, and then answer the question below.
Which host is rogue?