Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)
Which three communication methods are used by FortiNAC to gather information from and control, infrastructure devices? (Choose three.)
In which view would you find who made modifications to a Group?
What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?
What capability do logical networks provide?