Fortinet NSE6_FWF-6.4 Practice Test - Questions Answers

List of questions
Question 1

Refer to the exhibit.
What does the asterisk (*) symbol beside the channel mean?
Indicates channels that can be used only when Radio Resource Provisioning is enabled
Indicates channels that cannot be used because of regulatory channel restrictions
Indicates channels that will be scanned by the Wireless Intrusion Detection System (WIDS)
Indicates channels that are subject to dynamic frequency selection (DFS) regulations
This frequencies are also used by other licensed applications, wireless LANs have to use a specific method to gain access to certain higher frequencies and this method is known as DFS.
Question 2

What is the first discovery method used by FortiAP to locate the FortiGate wireless controller in the default configuration?
DHCP
Static
Broadcast
Multicast
According to the web search results, the first discovery method used by FortiAP to locate the FortiGate wireless controller in the default configuration is static. This means that the FortiAP sends discovery requests to a preconfigured IP address that the controller owns. This is useful if the FortiAP and the controller are not in the same subnet and other discovery methods will not work. The other discovery methods are used in sequence if the static method fails or is not configured.
Reference:Advanced WiFi controller discovery | FortiAP / FortiWiFi 7.4.0
Question 3

When deploying a wireless network that is authenticated using EAP PEAP, which two configurations are required? (Choose two.)
An X.509 certificate to authenticate the client
An X.509 to authenticate the authentication server
A WPA2 or WPA3 personal wireless network
A WPA2 or WPA3 Enterprise wireless network
Question 4

Which statement is correct about security profiles on FortiAP devices?
Security profiles on FortiAP devices can use FortiGate subscription to inspect the traffic
Only bridge mode SSIDs can apply the security profiles
Disable DTLS on FortiAP
FortiGate performs inspection the wireless traffic
If a bridge mode SSID is configured for a managed FortiAP, you can add a security profile group to the wireless controller, if the FortiAP model supports the security profile. This is supported only in bridge mode.
Question 5

How are wireless clients assigned to a dynamic VLAN configured for hash mode?
Using the current number of wireless clients connected to the SSID and the number of IPs available in the least busy VLAN
Using the current number of wireless clients connected to the SSID and the number of clients allocated to each of the VLANs
Using the current number of wireless clients connected to the SSID and the number of VLANs available in the pool
Using the current number of wireless clients connected to the SSID and the group the FortiAP is a member of
VLAN from the VLAN pool based on a hash of the current number of SSID clients and the number of entries in the VLAN pool.
Question 6

A tunnel mode SSID is configured on a FortiGate wireless controller.
Which task must be completed before the SSID can be used?
The new network must be manually assigned to a FortiAP profile.
The wireless network interface must be assigned a Layer 3 address.
Security Fabric and HTTPS must be enabled on the wireless network interface.
The wireless network to Internet firewall policy must be configured.
The wireless network interface must be assigned a Layer 3 address because it acts as the gateway for the tunnel mode SSID traffic. The FortiGate wireless controller uses this interface to communicate with the FortiAPs and the wireless clients. Without a valid IP address, the tunnel mode SSID cannot function properly.
Reference:Secure Wireless LAN Course Description, page 5; [FortiOS 6.4.0 Handbook - Wireless Controller], page 24.
Question 7

When using FortiPresence as a captive portal, which two types of public authentication services can be used to access guest Wi-Fi? (Choose two.)
Question 8

Six APs are located in a remotely based branch office and are managed by a centrally hosted FortiGate. Multiple wireless users frequently connect and roam between the APs in the remote office.
The network they connect to, is secured with WPA2-PSK. As currently configured, the WAN connection between the branch office and the centrally hosted FortiGate is unreliable.
Which configuration would enable the most reliable wireless connectivity for the remote clients?
Question 9

Which of the following is a requirement to generate analytic reports using on-site FortiPresence deployment?
Question 10

Which two statements about distributed automatic radio resource provisioning (DARRP) are correct? (Choose two.)
Question