Which connecting endpoints are evaluated against all enabled device profiling rules?
When FortiNAC is managing VPN clients connecting through FortiGate. why must the clients run a FortiNAC agent?
Which three of the following are components of a security rule? (Choose three.)
Which system group will force at-risk hosts into the quarantine network, based on point of connection?