Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet Exam NSE6_FAC-6.4 Topic 2 Question 43 Discussion

Actual exam question for Fortinet's NSE6_FAC-6.4 exam
Question #: 43
Topic #: 2
[All NSE6_FAC-6.4 Questions]

When generating a TOTP for two-factor authentication, what two pieces of information are used by the algorithm to generate the TOTP?

Show Suggested Answer Hide Answer
Suggested Answer: A, B

enable guest portal services on FortiAuthenticator, you need to configure a portal policy that defines the conditions for presenting the guest portal to users and the authentication methods to use. You also need to configure at least one post-login service that defines what actions to take after a user logs in successfully, such as sending an email confirmation, assigning a VLAN, or creating a user account. Configuring a RADIUS client or an external authentication portal are optional steps that depend on your network setup and requirements. Reference: https://docs.fortinet.com/document/fortiauthenticator/6.4/administration-guide/372404/guest-management


Contribute your Thoughts:

Louann
10 hours ago
Hmm, I'm not too sure about this one. Let me think... Is it A) UUID and time? That would make sense for uniquely identifying the device.
upvoted 0 times
...
Avery
3 days ago
B) Time and seed seems like the obvious choice here. I learned about TOTP in my security course, and this is the core of how it works.
upvoted 0 times
...
Garry
3 days ago
I'm not sure, but I think it's either A) UUID and time or B) Time and seed. I need to review the algorithm again.
upvoted 0 times
...
Frederick
6 days ago
I agree with Carol, because the TOTP is time-based and requires a seed for generating the code.
upvoted 0 times
...
Carol
11 days ago
I think the answer is B) Time and seed.
upvoted 0 times
...

Save Cancel