Fortinet FCP_FWF_AD-7.4 - FCP - Secure Wireless LAN 7.4 Administrator Exam
Page: 1 / 6
Total 29 questions
Question #1 (Topic: Exam A)
How can you find the upstream and downstream link rates of a wireless client connected to a FortiAP?
A. On the FortiGate GUI, using the WiFi Client monitor
B. On the FortiAP CLI, using the cw_diag ksta command
C. On the FortiGate CLI, using the diagnose wireless-controller wlac -d sta command
D. On the FortiAP CLI, using the cw_diag -d sta command
Answer: A
Question #2 (Topic: Exam A)
Which two threats on wireless networks are detected by WIDS? (Choose two.)
A. Brute-force dictionary attacks
B. Unauthorized wireless connection
C. Rogue access points
D. WPA2 authentication vulnerabilities
Answer: AC
Question #3 (Topic: Exam A)
When enabling a Security Fabric connection on a FortiGate interface to manage FortiAP devices, which two types of CAPWAP communication channels are established between FortiGate and the FortiAP devices? (Choose two.)
A. Control channels
B. Data channels
C. Security channels
D. FortiLink channels
Answer: AB
Question #4 (Topic: Exam A)
Which two statements are correct about FortiAP and rogue APs? (Choose two.)
A. FortiAP offers automatic suppression of rogue APs when broadcasting SSIDs.
B. FortiAP scans rogue APs in the background while broadcasting SSIDs.
C. FortiAP detects rogue APs on dedicated monitoring radios.
D. FortiAP suppresses detected rogue APs manually.
Answer: BC
Question #5 (Topic: Exam A)
An IT department must provide wireless security to employees connected over remote FortiAP devices who must access corporate resources at the main office.
Which action must the IT department take to enforce security policies for all wireless stations accessing corporate resources across all remote locations?
Which action must the IT department take to enforce security policies for all wireless stations accessing corporate resources across all remote locations?
A. Configure VPN tunnels to transport secured data between the main office and branch offices.
B. Deploy further onsite IT personnel to these remote sites to enforce security inspection.
C. Transfer local resources from corporate data centers to cloud services to offer access to remote users.
D. Implement a teleworker topology to split traffic for further security inspection.
Answer: D