Fortinet NSE6_FWF-6.4 Fortinet NSE 6 - Secure Wireless LAN 6.4 Exam Practice Test

Page: 1 / 14
Total 35 questions
Question 1

Which statement is correct about security profiles on FortiAP devices?



Answer : D

Security profiles are a feature that allows FortiAP devices to apply various security functions to the wireless traffic, such as antivirus, web filter, application control, intrusion prevention, and botnet scanning. Security profiles can be enabled on both tunnel-mode and bridge-mode SSIDs, and can be applied either through the wireless controller configuration or through firewall policies on the FortiGate device. Security profiles can also inspect encrypted wireless traffic, as long as the FortiAP device has access to the encryption keys.

Security profiles on FortiAP devices can use FortiGate subscription services to inspect the traffic, such as FortiGuard Antivirus, FortiGuard Web Filter, FortiGuard Application Control, and FortiGuard IPS. This means that the FortiAP device can leverage the latest threat intelligence and updates from Fortinet to protect the wireless network from malicious or unwanted content.

Therefore, the correct answer is D. Security profiles on FortiAP devices can use FortiGate subscription to inspect the traffic.


FortiAP-S and FortiAP-U bridge mode security profiles

Configuring security | FortiAP / FortiWiFi 6.4.2

Security profiles - Fortinet Document Library

Question 2

Which statement is correct about security profiles on FortiAP devices?



Question 3

Which statement is correct about security profiles on FortiAP devices?



Answer : B


If a bridge mode SSID is configured for a managed FortiAP, you can add a security profile group to the wireless controller, if the FortiAP model supports the security profile. This is supported only in bridge mode.

Question 4
Question 5

Refer to the exhibit.

What does the asterisk (*) symbol beside the channel mean?



Answer : D

This frequencies are also used by other licensed applications, wireless LANs have to use a specific method to gain access to certain higher frequencies and this method is known as DFS.


Question 6

Where in the controller interface can you find a wireless client's upstream and downstream link rates?



Answer : A


Question 7

Which two statements about background rogue scanning are correct? (Choose two.)



Answer : A, C


Page:    1 / 14   
Total 35 questions