Which two methods are the most common methods to control and restrict administrative access on FortiAnalyzer? (Choose two.)
Which two actions should an administrator take to view Compromised Hosts on FortiAnalyzer? (Choose two.)
What must you consider when using log fetching? (Choose two.)
On FortiAnalyzer, what is a wildcard administrator account?