ExamGecko
Home / Fortinet / NSE6_FWF-6.4 / List of questions
Ask Question

Fortinet NSE6_FWF-6.4 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

Refer to the exhibit.

Fortinet NSE6_FWF-6.4 image Question 1 133281 12222024234406000000

What does the asterisk (*) symbol beside the channel mean?

Indicates channels that can be used only when Radio Resource Provisioning is enabled

Indicates channels that can be used only when Radio Resource Provisioning is enabled

Indicates channels that cannot be used because of regulatory channel restrictions

Indicates channels that cannot be used because of regulatory channel restrictions

Indicates channels that will be scanned by the Wireless Intrusion Detection System (WIDS)

Indicates channels that will be scanned by the Wireless Intrusion Detection System (WIDS)

Indicates channels that are subject to dynamic frequency selection (DFS) regulations

Indicates channels that are subject to dynamic frequency selection (DFS) regulations

Suggested answer: D
Explanation:

This frequencies are also used by other licensed applications, wireless LANs have to use a specific method to gain access to certain higher frequencies and this method is known as DFS.

asked 22/12/2024
Ahmed Khalifa
47 questions

Question 2

Report Export Collapse

What is the first discovery method used by FortiAP to locate the FortiGate wireless controller in the default configuration?

DHCP

DHCP

Static

Static

Broadcast

Broadcast

Multicast

Multicast

Suggested answer: B
Explanation:

According to the web search results, the first discovery method used by FortiAP to locate the FortiGate wireless controller in the default configuration is static. This means that the FortiAP sends discovery requests to a preconfigured IP address that the controller owns. This is useful if the FortiAP and the controller are not in the same subnet and other discovery methods will not work. The other discovery methods are used in sequence if the static method fails or is not configured.

Reference:Advanced WiFi controller discovery | FortiAP / FortiWiFi 7.4.0

asked 22/12/2024
Angel Castillo
32 questions

Question 3

Report Export Collapse

When deploying a wireless network that is authenticated using EAP PEAP, which two configurations are required? (Choose two.)

An X.509 certificate to authenticate the client

An X.509 certificate to authenticate the client

An X.509 to authenticate the authentication server

An X.509 to authenticate the authentication server

A WPA2 or WPA3 personal wireless network

A WPA2 or WPA3 personal wireless network

A WPA2 or WPA3 Enterprise wireless network

A WPA2 or WPA3 Enterprise wireless network

Suggested answer: B, D
asked 22/12/2024
Pedro Faro
29 questions

Question 4

Report Export Collapse

Which statement is correct about security profiles on FortiAP devices?

Security profiles on FortiAP devices can use FortiGate subscription to inspect the traffic

Security profiles on FortiAP devices can use FortiGate subscription to inspect the traffic

Only bridge mode SSIDs can apply the security profiles

Only bridge mode SSIDs can apply the security profiles

Disable DTLS on FortiAP

Disable DTLS on FortiAP

FortiGate performs inspection the wireless traffic

FortiGate performs inspection the wireless traffic

Suggested answer: B
Explanation:

If a bridge mode SSID is configured for a managed FortiAP, you can add a security profile group to the wireless controller, if the FortiAP model supports the security profile. This is supported only in bridge mode.

asked 22/12/2024
Aleksandar Jovasevic
45 questions

Question 5

Report Export Collapse

How are wireless clients assigned to a dynamic VLAN configured for hash mode?

Using the current number of wireless clients connected to the SSID and the number of IPs available in the least busy VLAN

Using the current number of wireless clients connected to the SSID and the number of IPs available in the least busy VLAN

Using the current number of wireless clients connected to the SSID and the number of clients allocated to each of the VLANs

Using the current number of wireless clients connected to the SSID and the number of clients allocated to each of the VLANs

Using the current number of wireless clients connected to the SSID and the number of VLANs available in the pool

Using the current number of wireless clients connected to the SSID and the number of VLANs available in the pool

Using the current number of wireless clients connected to the SSID and the group the FortiAP is a member of

Using the current number of wireless clients connected to the SSID and the group the FortiAP is a member of

Suggested answer: C
Explanation:

VLAN from the VLAN pool based on a hash of the current number of SSID clients and the number of entries in the VLAN pool.

asked 22/12/2024
Roman Roman
35 questions

Question 6

Report Export Collapse

A tunnel mode SSID is configured on a FortiGate wireless controller.

Which task must be completed before the SSID can be used?

The new network must be manually assigned to a FortiAP profile.

The new network must be manually assigned to a FortiAP profile.

The wireless network interface must be assigned a Layer 3 address.

The wireless network interface must be assigned a Layer 3 address.

Security Fabric and HTTPS must be enabled on the wireless network interface.

Security Fabric and HTTPS must be enabled on the wireless network interface.

The wireless network to Internet firewall policy must be configured.

The wireless network to Internet firewall policy must be configured.

Suggested answer: B
Explanation:

The wireless network interface must be assigned a Layer 3 address because it acts as the gateway for the tunnel mode SSID traffic. The FortiGate wireless controller uses this interface to communicate with the FortiAPs and the wireless clients. Without a valid IP address, the tunnel mode SSID cannot function properly.

Reference:Secure Wireless LAN Course Description, page 5; [FortiOS 6.4.0 Handbook - Wireless Controller], page 24.

asked 22/12/2024
Sukhpreet Sidhu
40 questions

Question 7

Report Export Collapse

When using FortiPresence as a captive portal, which two types of public authentication services can be used to access guest Wi-Fi? (Choose two.)

Social networks authentication

Social networks authentication

Software security token authentication

Software security token authentication

Short message service authentication

Short message service authentication

Hardware security token authentication

Hardware security token authentication

Suggested answer: A, C
Explanation:

According to the web search results, FortiPresence supports social networks authentication and short message service authentication as public authentication services for guest Wi-Fi access. Social networks authentication allows visitors to log in using their existing social media accounts, such as Facebook, Twitter, LinkedIn, Google, and Instagram. Short message service authentication allows visitors to receive a one-time password via SMS to their mobile phone number. These authentication methods are convenient and secure for visitors and provide valuable data for businesses. Software security token authentication and hardware security token authentication are not supported by FortiPresence as public authentication services for guest Wi-Fi access.

Reference:Configuring Captive Portal | FortiPresence 1.2.0,Configuring Captive Portal | FortiPresence 22.4.0

asked 22/12/2024
Wilco Gent
32 questions

Question 8

Report Export Collapse

Six APs are located in a remotely based branch office and are managed by a centrally hosted FortiGate. Multiple wireless users frequently connect and roam between the APs in the remote office.

The network they connect to, is secured with WPA2-PSK. As currently configured, the WAN connection between the branch office and the centrally hosted FortiGate is unreliable.

Which configuration would enable the most reliable wireless connectivity for the remote clients?

Configure a tunnel mode wireless network and enable split tunneling to the local network

Configure a tunnel mode wireless network and enable split tunneling to the local network

Configure a bridge mode wireless network and enable the Local standalone configuration option

Configure a bridge mode wireless network and enable the Local standalone configuration option

Configure a bridge mode wireless network and enable the Local authentication configuration option

Configure a bridge mode wireless network and enable the Local authentication configuration option

Install supported FortiAP and configure a bridge mode wireless network

Install supported FortiAP and configure a bridge mode wireless network

Suggested answer: B
Explanation:

Look for ''Continued FortiAP operation when WiFi controller connection is down'' im the link here: https://docs.fortinet.com/document/fortiap/7.0.4/fortiwifi-and-fortiap-configuration-guide/442078/how-to-configure-a-fortiap-local-bridge-private-cloud-managed-ap

asked 22/12/2024
Suraj Porwal
36 questions

Question 9

Report Export Collapse

Which of the following is a requirement to generate analytic reports using on-site FortiPresence deployment?

SQL services must be running

SQL services must be running

Two wireless APs must be sending data

Two wireless APs must be sending data

DTLS encryption on wireless traffic must be turned off

DTLS encryption on wireless traffic must be turned off

Wireless network security must be set to open

Wireless network security must be set to open

Suggested answer: A
Explanation:

https://docs.fortinet.com/document/fortipresence-vm/1.2.0/administration-guide/546812/introduction

asked 22/12/2024
Donna Brown
38 questions

Question 10

Report Export Collapse

Which two statements about distributed automatic radio resource provisioning (DARRP) are correct? (Choose two.)

DARRP performs continuous spectrum analysis to detect sources of interference. It uses this information to allow the AP to select the optimum channel.

DARRP performs continuous spectrum analysis to detect sources of interference. It uses this information to allow the AP to select the optimum channel.

DARRP performs measurements of the number of BSSIDs and their signal strength (RSSI). The controller then uses this information to select the optimum channel for the AP.

DARRP performs measurements of the number of BSSIDs and their signal strength (RSSI). The controller then uses this information to select the optimum channel for the AP.

DARRP measurements can be scheduled to occur at specific times.

DARRP measurements can be scheduled to occur at specific times.

DARRP requires that wireless intrusion detection (WIDS) be enabled to detect neighboring devices.

DARRP requires that wireless intrusion detection (WIDS) be enabled to detect neighboring devices.

Suggested answer: B, C
Explanation:

According to Fortinet training: 'When using DARRP, the AP selects the best channel available to use based on the scan results of BSSID/receive signal strength (RSSI) to AC' and 'To set the running time for DARRP optimization, use the following CLI command within the wireless controller setting: set darrp-optimize {integer}. Note that DARRP doesn't do continuous spectrum analysis...'

asked 22/12/2024
Adrien Gallais
38 questions
Total 35 questions
Go to page: of 4

Related questions