Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Fortinet > NSE 6 Network Security Specialist > NSE6_FWF-6.4

NSE6_FWF-6.4 Fortinet NSE 6 - Secure Wireless LAN 6.4 Question and Answers

Question # 4

When using FortiPresence as a captive portal, which two types of public authentication services can be used to access guest Wi-Fi? (Choose two.)

A.

Social networks authentication

B.

Software security token authentication

C.

Short message service authentication

D.

Hardware security token authentication

Full Access
Question # 5

Which statement describes FortiPresence location map functionality?

A.

Provides real-time insight into user movements

B.

Provides real-time insight into user online activity

C.

Provides real-time insight into user purchase activity

D.

Provides real-time insight into user usage stats

Full Access
Question # 6

Which statement is correct about security profiles on FortiAP devices?

A.

Security profiles on FortiAP devices can use FortiGate subscription to inspect the traffic

B.

Only bridge mode SSIDs can apply the security profiles

C.

Disable DTLS on FortiAP

D.

FortiGate performs inspection the wireless traffic

Full Access
Question # 7

Six APs are located in a remotely based branch office and are managed by a centrally hosted FortiGate. Multiple wireless users frequently connect and roam between the APs in the remote office.

The network they connect to, is secured with WPA2-PSK. As currently configured, the WAN connection between the branch office and the centrally hosted FortiGate is unreliable.

Which configuration would enable the most reliable wireless connectivity for the remote clients?

A.

Configure a tunnel mode wireless network and enable split tunneling to the local network

B.

Configure a bridge mode wireless network and enable the Local standalone configuration option

C.

Configure a bridge mode wireless network and enable the Local authentication configuration option

D.

Install supported FortiAP and configure a bridge mode wireless network

Full Access
Question # 8

Which statement is correct about security profiles on FortiAP devices?

A.

Security profiles can only be applied to unencrypted wireless traffic.

B.

Security profiles can only be applied via firewall policies on the FortiGate.

C.

Security profiles are only supported on Bridge-mode SSIDs.

D.

Security profiles on FortiAP devices can use FortiGate subscription to inspect the traffic.

Full Access
Question # 9

Refer to the exhibits.

Exhibit A

Exhibit B

The exhibits show the diagnose debug log of a station connection taken on the controller CLI.

Which security mode is used by the wireless connection?

A.

WPA2 Enterprise

B.

WPA3 Enterprise

C.

WPA2 Personal and radius MAC filtering

D.

Open, with radius MAC filtering

Full Access