A. When the AP detects PF Interference from an unknown source such as a cordless phone with a signal stronger that -70 dBm, it will increase its transmission power until it reaches the maximum configured TX power limit.
B. When the AP detects any other wireless signal stronger that -70 dBm, it will reduce its transmission power until it reaches the minimum configured TX power limit.
C. When the AP detects any interference from a trusted neighboring AP stronger that -70 dBm, it will reduce its transmission power until it reaches the minimum configured TX power limit.
D. When the AP detects any wireless client signal weaker than -70 dBm, it will reduce its transmission power until it reaches the maximum configured TX power limit.
A. Integration model
B. Predictive model
C. Architectural model
D. Analytical model
A. Security profiles on FortiAP devices can use FortiGate subscription to inspect the traffic.
B. Security profiles can only be applied to unencrypted wireless traffic.
C. Security profiles are only supported on Bridge-mode SSIDs.
D. Security profiles can only be applied via firewall policies on the FortiGate.
A. Broadcast
B. Multicast
C. DHCP
D. Static