Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NSE7_LED-7.0 Questions and Answers

Question # 6

A wireless network in a school provides guest access using a captive portal to allow unregistered users to self-register and access the network The administrator is requested to update the existing configuration to provide captive portal authentication through a secure connection (HTTPS)

Which two changes must the administrator make to enforce HTTPS authentication"? (Choose two >

A.

Create a new SSID with the HTTPS captive portal URL

B.

Enable HTTP redirect in the user authentication settings

C.

Disable HTTP administrative access on the guest SSID to enforce HTTPS connection

D.

Update the captive portal URL to use HTTPS on FortiGate and FortiAuthenticator

Full Access
Question # 7

When you configure a FortiAP wireless interface for auto TX power control which statement describes how it configures its transmission power"?

A.

Every 30 seconds the AP will measure the signal strength of the AP using the client The AP will adjust its signal strength up or down until the AP signal is detected at -70 dBm

B.

Every 30 seconds FortiGate measures the signal strength of adjacent AP interfaces It will adjust its own AP power to match the adjacent AP signal strength

C.

Every 30 seconds FortiGate measures the signal strength of adjacent FortiAP interfaces It will adjust the adjacent AP power to be detectable at -70 dBm

D.

Every 30 seconds FortiGate measures the signal strength of the weakest associated client The AP will then configure its radio power to match the detected signal strength of the client

Full Access
Question # 8

Refer to the exhibits.

Firewall Policy

Examine the firewall policy configuration and SSID settings

An administrator has configured a guest wireless network on FortiGate using the external captive portal The administrator has verified that the external captive portal URL is correct However wireless users are not able to see the captive portal login page

Given the configuration shown in the exhibit and the SSID settings which configuration change should the administrator make to fix the problem?

A.

Disable the user group from the SSID configuration

B.

Enable the captivs-portal-exempt option in the firewall policy with the ID 11.

C.

Apply a guest.portal user group in the firewall policy with the ID 11.

D.

Include the wireless client subnet range in the Exempt Source section

Full Access
Question # 9

Refer to the exhibit.

Examine the debug output shown in the exhibit

Which two statements about the RADIUS debug output are true'' (Choose two)

A.

The user student belongs to the SSLVPN group

B.

User authentication failed

C.

The RADIUS server sent a vendor-specific attribute in the RADIUS response

D.

User authentication succeeded using MSCHAP

Full Access
Question # 10

Refer to the exhibits.

Exhibit.

Examine the troubleshooting outputs shown in the exhibits

Users have been reporting issues with the speed of their wireless connection in a particular part of the wireless network The interface that is having issues is the 2 4 GHz interface that is currently configured on channel 6

The administrator of the wireless network has investigated and surveyed the local RF environment using the tools available at the AP and FortiGate

Which configuration would improve the wireless connection?

A.

Change the AP 2 4 GHz channel to 11

B.

Change the AP 2 4 GHz channel to 1.

C.

Change the AP 2 4 GHz channel to 9.

D.

Change the AP 2 4 GHz channel to 13.

Full Access
Question # 11

What is the purpose of enabling Windows Active Directory Domain Authentication on FortiAuthenticator?

A.

It enables FortiAuthenticator to use Windows administrator credentials to perform an LDAP lookup for a user search

B.

It enables FortiAuthenticator to use a Windows CA certificate when authenticating RADIUS users

C.

It enables FortiAuthenticator to import users from Windows AD

D.

It enables FortiAuthenticator to register itself as a Windows trusted device to proxy authentication using Kerberos

Full Access