Which two statements about the anti-defacement feature on FortiWeb are true? (Choose two.)
True transparent proxy mode is best suited for use in which type of environment?
You’ve configured an authentication rule with delegation enabled on FortiWeb.
What happens when a user tries to access the web application?