Fortinet NSE6_FWF-6.4 Practice Test - Questions Answers, Page 2
List of questions
Question 11

Which factor is the best indicator of wireless client connection quality?
Downstream link rate, the connection rate for the AP to the client
The receive signal strength (RSS) of the client at the AP
Upstream link rate, the connection rate for the client to the AP
The channel utilization of the channel the client is using
Question 12

When configuring Auto TX Power control on an AP radio, which two statements best describe how the radio responds? (Choose two.)
When the AP detects any other wireless signal stronger that -70 dBm, it will reduce its transmission power until it reaches the minimum configured TX power limit.
When the AP detects PF Interference from an unknown source such as a cordless phone with a signal stronger that -70 dBm, it will increase its transmission power until it reaches the maximum configured TX power limit.
When the AP detects any wireless client signal weaker than -70 dBm, it will reduce its transmission power until it reaches the maximum configured TX power limit.
When the AP detects any interference from a trusted neighboring AP stronger that -70 dBm, it will reduce its transmission power until it reaches the minimum configured TX power limit.
According to the web search results, Auto TX Power control is a feature that allows the AP to automatically adjust its transmission power based on the RF environment. The goal is to minimize interference and optimize coverage cells for roaming. When the AP detects any other wireless signal stronger than -70 dBm, it means that there is a potential source of interference nearby, so it will reduce its transmission power until it reaches the minimum configured TX power limit. This will reduce the interference and improve coexistence with other devices. When the AP detects any interference from a trusted neighboring AP stronger than -70 dBm, it means that there is a high density of APs in the area, so it will also reduce its transmission power until it reaches the minimum configured TX power limit. This will balance the load and avoid overlapping coverage areas.
Reference:AP Transmit Power and Enable Power Reduction with Auto TX,Transmit Power and Antenna Configuration,Meraki Auto RF: Wi-Fi Channel and Power Management
Question 13

Refer to the exhibits.
Exhibit A
Exhibit B
Exhibit C
A wireless network has been installed in a small office building and is being used by a business to connect its wireless clients. The network is used for multiple purposes, including corporate access, guest access, and connecting point-of-sale and Io devices.
Users connecting to the guest network located in the reception area are reporting slow performance. The network administrator is reviewing the information shown in the exhibits as part of the ongoing investigation of the problem. They show the profile used for the AP and the controller RF analysis output together with a screenshot of the GUI showing a summary of the AP and its neighboring APs.
To improve performance for the users connecting to the guest network in this area, which configuration change is most likely to improve performance?
Increase the transmission power of the AP radios
Enable frequency handoff on the AP to band steer clients
Reduce the number of wireless networks being broadcast by the AP
Install another AP in the reception area to improve available bandwidth
Question 14

Which two statements about background rogue scanning are correct? (Choose two.)
A dedicated radio configured for background scanning can support the connection of wireless clients
When detecting rogue APs, a dedicated radio configured for background scanning can suppress the rogue AP
Background rogue scanning requires DARRP to be enabled on the AP instance
A dedicated radio configured for background scanning can detect rogue devices on all other channels in its configured frequency band
Question 15

When configuring a wireless network for dynamic VLAN allocation, which three IETF attributes must be supplied by the radius server? (Choose three.)
81 Tunnel-Private-Group-ID
65 Tunnel-Medium-Type
83 Tunnel-Preference
58 Egress-VLAN-Name
64 Tunnel-Type
The RADIUS user attributes used for the VLAN ID assignment are:
IETF 64 (Tunnel Type)---Set this to VLAN.
IETF 65 (Tunnel Medium Type)---Set this to 802
IETF 81 (Tunnel Private Group ID)---Set this to VLAN ID.
Dynamic VLAN allocation is a feature that allows wireless clients to be assigned to different VLANs based on RADIUS attributes returned by the authentication server. The three IETF attributes that must be supplied by the RADIUS server are: 81 Tunnel-Private-Group-ID, which specifies the VLAN ID for the client; 65 Tunnel-Medium-Type, which specifies the tunneling protocol as IEEE-802 (Ethernet); and 64 Tunnel-Type, which specifies the tunneling method as VLAN.
Reference:FortiOS 6.4.0 Handbook - Wireless Controller, page 60;FortiAP / FortiWiFi 6.4.0 Administration Guide, page 68.
Question 16

Which two phases are part of the process to plan a wireless design project? (Choose two.)
Project information phase
Hardware selection phase
Site survey phase
Installation phase
According to the web search results, the project information phase and the site survey phase are part of the process to plan a wireless design project. The project information phase involves defining the project scope, objectives, requirements, deliverables, and stakeholders.It also includes creating a project plan, a risk management plan, a communication plan, and a budget.1The site survey phase involves conducting a physical inspection of the site where the wireless network will be deployed, measuring the signal strength and interference levels, identifying the optimal locations for the access points and antennas, and validating the network performance and coverage.2The hardware selection phase and the installation phase are not part of the planning process, but rather part of the implementation process.The hardware selection phase involves choosing the appropriate wireless devices, such as access points, routers, switches, controllers, and cables, based on the network design and specifications.3The installation phase involves installing, configuring, testing, and documenting the wireless network components according to the project plan and best practices.3Reference:Wireless Device Network Planning and Design - Emerson,Telecommunications and Implementation Project Management - BICSI,Project Planning | Wireless Design Services | Digi International
Question 17

When enabling security fabric on the FortiGate interface to manage FortiAPs, which two types of communication channels are established between FortiGate and FortiAPs? (Choose two.)
Control channels
Security channels
FortLink channels
Data channels
The control channel for managing traffic, which is always encrypted by DTLS. l The data channel for carrying client data packets.
When enabling security fabric on the FortiGate interface to manage FortiAPs, two types of communication channels are established between FortiGate and FortiAPs: control channels and data channels. Control channels are used for management and configuration of the FortiAPs, such as firmware updates, provisioning, and monitoring. Data channels are used for tunneling wireless traffic from the FortiAPs to the FortiGate for security inspection and policy enforcement.
Reference:FortiOS 6.4.0 Handbook - Security Fabric, page 17;FortiOS 6.4.0 Handbook - Wireless Controller, page 15.
Question 18

Part of the location service registration process is to link FortiAPs in FortiPresence.
Which two management services can configure the discovered AP registration information from the FortiPresence cloud? (Choose two.)
AP Manager
FortiAP Cloud
FortiSwitch
FortiGate
FortiGate, FortiCloud wireless access points (send visitor data in the form of station reports directly to FortiPresence)
Part of the location service registration process is to link FortiAPs in FortiPresence, which is a cloud-based service that provides location analytics and customer engagement tools for wireless networks. The management services that can configure the discovered AP registration information from the FortiPresence cloud are FortiAP Cloud and FortiGate. FortiAP Cloud is a cloud-based wireless LAN management platform that can discover, configure, monitor, and troubleshoot FortiAP devices. FortiGate is a network security appliance that can act as a wireless controller and manage FortiAP devices through security fabric or CAPWAP protocols.
Reference:FortiPresence Data Sheet, page 1;FortiOS 6.4.0 Handbook - Wireless Controller, page 9.
Question 19

Which two configurations are compatible for Wireless Single Sign-On (WSSO)? (Choose two.)
A VAP configured for captive portal authentication
A VAP configured for WPA2 or 3 Enterprise
A VAP configured to authenticate locally on FortiGate
A VAP configured to authenticate using a radius server
In the SSID choose WPA2-Enterprise authentication.
WSSO is RADIUS-based authentication that passes the user's user group memberships to the FortiGate.
Wireless Single Sign-On (WSSO) is a RADIUS-based authentication method that passes the user's user group memberships to the FortiGate for policy enforcement. WSSO can be configured for a VAP that uses WPA2 or WPA3 Enterprise authentication, which requires users to enter their credentials when connecting to the wireless network. WSSO can also be configured for a VAP that authenticates users using a RADIUS server, which returns the user group information in the Fortinet-Group-Name attribute.
Reference:FortiOS 6.4.0 Handbook - Wireless Controller, page 57;FortiOS 6.4.0 Handbook - Authentication, page 59.
Question 20

Where in the controller interface can you find a wireless client's upstream and downstream link rates?
On the AP CLI, using the cw_diag ksta command
On the controller CLI, using the diag wireless-controller wlac -d sta command
On the AP CLI, using the cw_diag -d sta command
On the controller CLI, using the WiFi Client monitor
Question