Which three circumstances trigger Layer 2 polling of infrastructure devices? (Choose three.)
Which system group will force at-risk hosts into the quarantine network, based on point of connection?
Which three of the following are components of a security rule? (Choose three.)
Which two things must be done to allow FortiNAC to process incoming syslog messages from an unknown vendor? (Choose two.)