Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A tunnel mode wireless network is configured on a FortiGate wireless controller.

Which task must be completed before the wireless network can be used?

A.

The wireless network interface must be assigned a Layer 3 address

B.

Security Fabric and HTTPS must be enabled on the wireless network interface

C.

The wireless network to Internet firewall policy must be configured

D.

The new network must be manually assigned to a FortiAP profile.

Which of the following is a requirement to generate analytic reports using on-site FortiPresence deployment?

A.

SQL services must be running

B.

Two wireless APs must be sending data

C.

DTLS encryption on wireless traffic must be turned off

D.

Wireless network security must be set to open

When using FortiPresence as a captive portal, which two types of public authentication services can be used to access guest Wi-Fi? (Choose two.)

A.

Social networks authentication

B.

Software security token authentication

C.

Short message service authentication

D.

Hardware security token authentication

Which two statements about distributed automatic radio resource provisioning (DARRP) are correct? (Choose two.)

A.

DARRP performs continuous spectrum analysis to detect sources of interference. It uses this information to allow the AP to select the optimum channel.

B.

DARRP performs measurements of the number of BSSIDs and their signal strength (RSSI). The controller then uses this information to select the optimum channel for the AP.

C.

DARRP measurements can be scheduled to occur at specific times.

D.

DARRP requires that wireless intrusion detection (WIDS) be enabled to detect neighboring devices.

Refer to the exhibit.

What does the asterisk (*) symbol beside the channel mean?

A.

Indicates channels that can be used only when Radio Resource Provisioning is enabled

B.

Indicates channels that cannot be used because of regulatory channel restrictions

C.

Indicates channels that will be scanned by the Wireless Intrusion Detection System (WIDS)

D.

Indicates channels that are subject to dynamic frequency selection (DFS) regulations

Which statement is correct about security profiles on FortiAP devices?

A.

Security profiles are only supported on Bridge-mode SSIDs.

B.

Security profiles can only be applied via firewall policies on the FortiGate.

C.

Security profiles can only be applied to unencrypted wireless traffic.

D.

Security profiles on FortiAP devices can use FortiGate subscription to inspect the traffic.

You are investigating a wireless performance issue and you are trying to audit the neighboring APs in the PF environment. You review the Rogue APs widget on the GUI but it is empty, despite the known presence of other APs.

Which configuration change will allow neighboring APs to be successfully detected?

A.

Enable Locate WiFi clients when not connected in the relevant AP profiles.

B.

Enable Monitor channel utilization on the relevant AP profiles.

C.

Ensure that all allowed channels are enabled for the AP radios.

D.

Enable Radio resource provisioning on the relevant AP profiles.

How are wireless clients assigned to a dynamic VLAN configured for hash mode?

A.

Using the current number of wireless clients connected to the SSID and the number of IPs available in the least busy VLAN

B.

Using the current number of wireless clients connected to the SSID and the number of clients allocated to each of the VLANs

C.

Using the current number of wireless clients connected to the SSID and the number of VLANs available in the pool

D.

Using the current number of wireless clients connected to the SSID and the group the FortiAP is a member of

Six APs are located in a remotely based branch office and are managed by a centrally hosted FortiGate. Multiple wireless users frequently connect and roam between the APs in the remote office.

The network they connect to, is secured with WPA2-PSK. As currently configured, the WAN connection between the branch office and the centrally hosted FortiGate is unreliable.

Which configuration would enable the most reliable wireless connectivity for the remote clients?

A.

Configure a tunnel mode wireless network and enable split tunneling to the local network

B.

Configure a bridge mode wireless network and enable the Local standalone configuration option

C.

Configure a bridge mode wireless network and enable the Local authentication configuration option

D.

Install supported FortiAP and configure a bridge mode wireless network

Which two roles does FortiPresence analytics assist in generating presence reports? (Choose two.)

A.

Gathering details about on site visitors

B.

Predicting the number of guest users visiting on-site

C.

Comparing current data with historical records

D.

Reporting potential threats by guests on site