FCP_SWL_7.4_V1
|
|
Título del Test:
![]() FCP_SWL_7.4_V1 Descripción: FCP_SWL_7.4 V1 |



| Comentarios |
|---|
NO HAY REGISTROS |
|
Which two statements are true about AP profiles? (Choose two.). AP profiles are model specific. A profile must be applied manually to an AP before it can be managed by FortiGate. An AP must be authorized before having a profile applied. A FortiAP profile must be applied to a FortiAP group. Why might a client have difficulty connecting to an SSID broadcasting on 5 GHz, but not on 2.4 GHz?. The AP's location is unsuitable. Limitations of the client device's radio. DHCP server issues. Encryption mismatch issues. You are investigating a wireless performance issue and you are trying to audit the neighboring APs in the PF environment. You review the Rogue APs widget on the GUI but it is empty, despite the known presence of other APs. Which configuration change will allow neighboring APs to be successfully detected?. Enable Locate WiFi clients when not connected in the relevant AP profiles. Enable Monitor channel utilization on the relevant AP profiles. Ensure that all allowed channels are enabled for the AP radios. Enable Radio resource provisioning on the relevant AP profiles. Which of the following features distinguishes FortiPresence from FortiPlanner?. FortiPresence is used primarily for network threat detection. FortiPresence provides analytics solutions. FortiPlanner is used as a wireless controller. FortiPlanner is a cloud-based deployment tool. Which two statements about distributed automatic radio resource provisioning (DARRP) are correct? (Choose two.). DARRP performs continuous spectrum analysis to detect sources of interference. It uses this information to allow the AP to select the optimum channel. DARRP performs measurements of the number of BSSIDs and their signal strength (RSSI). The controller then uses this information to select the optimum channel for the AP. DARRP measurements can be scheduled to occur at specific times. DARRP requires that wireless intrusion detection (WIDS) be enabled to detect neighboring devices. Which of the following are considered wireless security options?. WPA3 encryption. Rogue AP scanning. Firmware updating. SSID hiding. What configurations can be applied through FortiAP profiles to manage FortiAP devices? (Select all that apply). Advanced wireless settings. SSID hiding. VLAN configurations. Client load balancing. As standard best practice, which configuration should be performed before configuring FortiAPs using a FortiGate wireless controller?. Set the wireless controller country setting. Create a custom AP profile. Preauthorize APs. Create wireless LAN specific policies. When using FortiPresence as a captive portal, which two types of public authentication services can be used to access guest Wi-Fi? (Choose two.). Hardware security token authentication. Short message service authentication. Software security token authentication. Social networks authentication. WIDS profiles are primarily used for: Deploying firmware updates to APs. Wireless Intrusion Detection System configurations. Enhancing Wi-Fi signal strength. Assigning IP addresses to wireless clients. What is the purpose of configuring WPA3 encryption on a wireless network?. To improve wireless signal strength. To provide strong security for wireless communications. To enable load balancing for wireless clients. To manage guest accounts on the network. What are the benefits of using FortiPresence analytics in a wireless network? (Select all that apply). Monitoring and suppressing rogue APs. Gaining insights into user behavior and footfall patterns. Enhancing wireless signal strength. Providing real-time data for decision-making. What is the main advantage of deploying FortiAP devices using FortiAP Cloud?. Direct access to FortiGate configurations. Enhanced threat analytics and monitoring. Simplified deployment and centralized management. Predictive modeling capabilities for network expansion. Which command is used to enable WIDS profiles on a FortiGate device?. config wireless-controller wids. config wlan wids-profile. config firewall wids. config wifi wids. VLAN load-balancing features are designed to: Create guest accounts for the network. Enhance wireless signal strength. Distribute traffic across multiple VLANs efficiently. Secure wireless traffic using encryption. To ensure that traffic from different wireless clients is efficiently balanced among several access points in a high-density environment, you would primarily: Configure VLANs on each SSI. Enable advanced bridge mode. Use the FortiGate guest management feature. Configure FortiAP and client load balancing. In the context of wireless security, SSID hiding: Helps in boosting Wi-Fi signal strength. Allows APs to automatically detect and connect to each other. Makes the network invisible to casual scanning by devices. Enables the AP to detect rogue APs. Which measure is the best indication of a wireless client’s connection quality?. Client link rates. AP association count. Client signal strength. Channel utilization. Which factor is the best indicator of wireless client connection quality?. Downstream link rate, the connection rate for the AP to the client. The receive signal strength (RSS) of the client at the AP. Upstream link rate, the connection rate for the client to the AP. The channel utilization of the channel the client is using. When configuring Auto TX Power control on an AP radio, which two statements best describe how the radio responds? (Choose two.). When the AP detects any other wireless signal stronger that -70 dBm, it will reduce its transmission power until it reaches the minimum configured TX power limit. When the AP detects PF Interference from an unknown source such as a cordless phone with a signal stronger that -70 dBm, it will increase its transmission power until it reaches the maximum configured TX power limit. When the AP detects any wireless client signal weaker than -70 dBm, it will reduce its transmission power until it reaches the maximum configured TX power limit. When the AP detects any interference from a trusted neighboring AP stronger that -70 dBm, it will reduce its transmission power until it reaches the minimum configured TX power limit. When securing a wireless environment, which measures can help prevent unauthorized access?. MAC address filtering. Enabling a guest network. Using strong encryption like WPA3. Regularly changing the network name (SSID). What is the first discovery method used by FortiAP to locate the FortiGate wireless controller in the default configuration?. DHCP. Static. Broadcast. Multicast. Which two phases are part of the process to plan a wireless design project? (Choose two.). Project information phase. Hardware selection phase. Site survey phase. Installation phase. The exhibits show the diagnose debug log of a station connection taken on the controller CLI. Which security mode is used by the wireless connection?. WPA2 Enterprise. WPA3 Enterprise. WPA2 Personal and radius MAC filtering. Open, with radius MAC filtering. |




