Refer to the exhibits.
Exhibit A
Exhibit B
The exhibits show the diagnose debug log of a station connection taken on the controller CLI. Which security mode is used by the wireless connection?
Correct Answer:C
When deploying a wireless network that is authenticated using EAP PEAP, which two configurations are required? (Choose two.)
Correct Answer:BD
As a network administrator, you are responsible for managing an enterprise secure wireless LAN. The controller is based in the United States, and you have been asked to deploy a number of managed APs in a remote office in Germany.
What is the correct way to ensure that the RF channels and transmission power limits are appropriately configured for the remote APs?
Correct Answer:C
What type of design model does FortiPlanner use in wireless design project?
Correct Answer:B
Which administrative access method must be enabled on a FortiGate interface to allow APs to connect and function?
Correct Answer:A
Six APs are located in a remotely based branch office and are managed by a centrally hosted FortiGate. Multiple wireless users frequently connect and roam between the APs in the remote office.
The network they connect to, is secured with WPA2-PSK. As currently configured, the WAN connection between the branch office and the centrally hosted FortiGate is unreliable.
Which configuration would enable the most reliable wireless connectivity for the remote clients?
Correct Answer:A