Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Fortinet NSE6_FWF-6.4 - Fortinet NSE 6 - Secure Wireless LAN 6.4

Page: 1 / 1
Total 35 questions

Six APs are located in a remotely based branch office and are managed by a centrally hosted FortiGate. Multiple wireless users frequently connect and roam between the APs in the remote office.

The network they connect to, is secured with WPA2-PSK. As currently configured, the WAN connection between the branch office and the centrally hosted FortiGate is unreliable.

Which configuration would enable the most reliable wireless connectivity for the remote clients?

A.

Configure a tunnel mode wireless network and enable split tunneling to the local network

B.

Configure a bridge mode wireless network and enable the Local standalone configuration option

C.

Configure a bridge mode wireless network and enable the Local authentication configuration option

D.

Install supported FortiAP and configure a bridge mode wireless network

When deploying a wireless network that is authenticated using EAP PEAP, which two configurations are required? (Choose two.)

A.

An X.509 certificate to authenticate the client

B.

An X.509 to authenticate the authentication server

C.

A WPA2 or WPA3 personal wireless network

D.

A WPA2 or WPA3 Enterprise wireless network

A tunnel mode SSID is configured on a FortiGate wireless controller.

Which task must be completed before the SSID can be used?

A.

The new network must be manually assigned to a FortiAP profile.

B.

The wireless network interface must be assigned a Layer 3 address.

C.

Security Fabric and HTTPS must be enabled on the wireless network interface.

D.

The wireless network to Internet firewall policy must be configured.

Which statement is correct about security profiles on FortiAP devices?

A.

Security profiles on FortiAP devices can use FortiGate subscription to inspect the traffic

B.

Only bridge mode SSIDs can apply the security profiles

C.

Disable DTLS on FortiAP

D.

FortiGate performs inspection the wireless traffic

Which two statements about background rogue scanning are correct? (Choose two.)

A.

A dedicated radio configured for background scanning can support the connection of wireless clients

B.

When detecting rogue APs, a dedicated radio configured for background scanning can suppress the rogue AP

C.

Background rogue scanning requires DARRP to be enabled on the AP instance

D.

A dedicated radio configured for background scanning can detect rogue devices on all other channels in its configured frequency band

What is the first discovery method used by FortiAP to locate the FortiGate wireless controller in the default configuration?

A.

DHCP

B.

Static

C.

Broadcast

D.

Multicast

As standard best practice, which configuration should be performed before configuring FortiAPs using a FortiGate wireless controller?

A.

Create wireless LAN specific policies

B.

Preauthorize APs

C.

Create a custom AP profile

D.

Set the wireless controller country setting

Refer to the exhibit.

If the signal is set to -68 dB on the FortiPlanner site survey reading, which statement is correct regarding the coverage area?

A.

Areas with the signal strength equal to -68 dB are zoomed in to provide better visibility

B.

Areas with the signal strength weaker than -68 dB are cut out of the map

C.

Areas with the signal strength equal or stronger than -68 dB are highlighted in multicolor

D.

Areas with the signal strength weaker than -68 dB are highlighted in orange and red to indicate that no signal was propagated by the APs.

Which of the following is a requirement to generate analytic reports using on-site FortiPresence deployment?

A.

SQL services must be running

B.

Two wireless APs must be sending data

C.

DTLS encryption on wireless traffic must be turned off

D.

Wireless network security must be set to open

When configuring Auto TX Power control on an AP radio, which two statements best describe how the radio responds? (Choose two.)

A.

When the AP detects any other wireless signal stronger that -70 dBm, it will reduce its transmission power until it reaches the minimum configured TX power limit.

B.

When the AP detects PF Interference from an unknown source such as a cordless phone with a signal stronger that -70 dBm, it will increase its transmission power until it reaches the maximum configured TX power limit.

C.

When the AP detects any wireless client signal weaker than -70 dBm, it will reduce its transmission power until it reaches the maximum configured TX power limit.

D.

When the AP detects any interference from a trusted neighboring AP stronger that -70 dBm, it will reduce its transmission power until it reaches the minimum configured TX power limit.