Which two options are determined by the Security Level? (Choose two.)
if the CA fingerprint needs to be confirmed during an installation or upgrade
if a host requires a token during installation
the idle log off timeout for the NetBackup Administration Console
whether insecure communication with NetBackup 8.0 and earlier hosts is allowed
how often CRLs are updated
Submit