Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Download Full Version FCP_FWF_AD-7.4 Fortinet Exam

FCP - Secure Wireless LAN 7.4 Administrator Questions and Answers

Question 5

Refer to the exhibit.

The wireless client connects to the wireless network on WLAN_NET tunnel mode interface The exhibit stows the client exchange communication with the wireless controller and the RADIUS server

Which two issues can you observe in the wireless station debug outputs (Choose two.)

Options:

A.

The wireless client has an unsuccessful association with the wireless controller

B.

The wireless client has failed to complete the four-way handshake process.

C.

The wireless client has denied the connection after many failed trials

D.

The wireless client has incorrect credentials to authenticate with the authentication server

Question 6

Refer to the exhibit.

An administrator authorizes two FortiAP devices connected to this wireless controller However, one FortiAP is not able to broadcast the SSIDs. What must the administrator do to fix the issue?

Options:

A.

Enable the radios on the FAP23JF FortiAP profile.

B.

Replace the FortiAP device model to match the other device

C.

Disable the override setting on the FortiAP that is preventing it from broadcasting SSIDs

D.

Assign the FAP231F FortiAP profile to the problematic FortiAP device

Question 7

Refer to the exhibit.

A new security policy is made by the IT department to prevent direct communication between wireless stations There is one SSID configured in bridge mode Which statement is correct as a plan of action to update the wireless network configuration?

Options:

A.

Create unique SSIDs for each FortiAP device

B.

Add an upstream layer 3 device on each FortiAP device

C.

Block intra-SSID traffic on the wireless network

D.

Drop all local traffic in the wireless network

Question 8

An IT department must provide wireless security to employees connected over remote hortiAP devices who must access corporate resources at the mam office Which action must the IT department take to enforce security policies for all wireless stations accessing corporate resources across all remote locations?

Options:

A.

Configure VPN tunnels to transport secured data between the main office and branch offices

B.

Deploy further onsite IT personnel to these remote sites to enforce security inspection

C.

Transfer local resources from corporate data centers to cloud services to offer access to remote users

D.

Implement a teleworker topology to split traffic for further security inspection