Question 6 of 30

Which network configuration is required when depioying FortiAuthenticator for portal services?

    Correct Answer: B

    When deploying FortiAuthenticator for portal services, it is essential to ensure that policies have specific ports open between FortiAuthenticator and the authentication clients. This configuration is crucial for enabling communication and facilitating authentication processes between the clients and FortiAuthenticator.

Question 7 of 30

You are a FortiAuthenticator administrator for a large organization. Users who are configured to use FortiToken 200 for two-factor authentication can no longer authenticate. You have verified that only the users with two-factor authentication are experiencing the issue.

What can cause this issue?

    Correct Answer: C

    Time drift between FortiAuthenticator and hardware tokens can cause users to no longer authenticate. If the internal clocks of FortiAuthenticator and the FortiToken 200 devices are not synchronized, the one-time passwords (OTPs) generated by the tokens will not match the expected values, leading to authentication failures. Ensuring time synchronization or configuring time drift tolerance can resolve this issue.

Question 8 of 30

Why would you configure an OCSP responder URL in an end-entity certificate?

    Correct Answer: C

    Configuring an OCSP responder URL in an end-entity certificate is necessary to designate a server for certificate status checking. OCSP stands for Online Certificate Status Protocol, which helps verify whether a certificate is valid or has been revoked in real-time. The specified OCSP responder URL points to the server that can provide the status of the certificate.

Question 9 of 30

An administrator wants to keep local CA cryptographic keys stored in a central location.

Which FortiAuthenticator feature would provide this functionality?

    Correct Answer: C

    To keep local CA cryptographic keys stored in a central location, the FortiAuthenticator feature required is Network HSM (Hardware Security Module). Network HSMs are designed to protect and manage digital keys for strong authentication, ensuring that cryptographic keys are securely stored and managed in a centralized in a hardware device.

Question 10 of 30

Which option correctly describes an SP-initiated SSO SAML packet flow for a host without a SAML assertion?

    Correct Answer: A

    In an SP-initiated Single Sign-On (SSO) SAML flow, when a principal (user) does not have a SAML assertion, the correct sequence is as follows: The principal first contacts the service provider. Since the principal does not have a SAML assertion, the service provider redirects the principal to the identity provider. The identity provider then authenticates the principal. After successful authentication, the identity provider sends the principal back to the service provider with the necessary SAML assertion. This sequence ensures that the user is authenticated by the identity provider before accessing services from the service provider.