1. FortiOS Administration Guide 7.0.0
Page 1011
"Security Fabric topology": "From the root FortiGate
you can right-click a device in the topology to perform actions
such as logging in to the device
upgrading the firmware
or rebooting the device." This directly supports option A.
2. FortiOS Administration Guide 7.0.0
Page 1043
"Banning an IP address": "When a compromised host is detected
the FortiGate can ban the host's IP address from accessing the network. In the Security Fabric
the root FortiGate shares the banned IP address with the other FortiGates in the Security Fabric." This confirms that managing the banned IP list is a root FortiGate function
supporting option D.
3. FortiOS Administration Guide 7.0.0
Page 833
"Log Settings": This section details that log settings are configured on a per-device basis under the Log & Report menu
demonstrating that this is not an action exclusive to the root FortiGate. This refutes option B.
4. FortiOS Administration Guide 7.0.0
Page 487
"FortiSwitch Manager": The documentation explains that FortiSwitch devices are managed from the FortiGate they are connected to. This management is not exclusive to the root FortiGate in a multi-FortiGate fabric. This refutes option C.