Skip to main content

Final Fantasy Tactics - Chapter 2: Golgorand Execution site




   
Enemies:  1 dark knight ( Gafgarion ), 3 knights, 2 archers, 2 Time Mages   Guests:  None

This can be tough since you are clearly outnumbered by your enemies, start off by taking out Gafgarion with a strong spell, like Flare, Holy, Cyclops or Bahamut. Once Gafgarion leaves, attack the knights first.  Agrias should use Lightning Stab on the Timemages, that should kill em off, save the archers for last. A trick is to use lancers, whenever a TimeMage uses a spell on your lancer, have him/her move next to an enemy and Jump to avoid the spell. If you are in luck, the timemage will have slowed or stopped his own ally. By now, I really do reccomend Auto Potion on everyone, you really need it.






CREDIT:

Final Fantasy Tactics

ไฟนอลแฟนตาซี แทกติกส์

แนวทางการเล่น
WALKTHROUGH/GUIDES

ตัวละครและอาชีพ
Character&Job

ข้อมูลเบื้องต้น
Basic information

ข้อมูลที่น่าสนใจ
ARRTICLE INTERESTING

ความลับ, โกงเกม
Secrets, Cheat Game

เว็บไซต์:ข้อมูลที่เกี่ยวข้อง
RELATED WEBSITES

ดาวน์โหลดเกม
GAME DOWNLOAD


We use cookies to improve your experience on our website. By browsing this website, you agree to our use of cookies.

Cookies Policy


General Use

We use cookies, tracking pixels and related technologies on our website. Cookies are small data files that are served by our platform and stored on your device. Our site uses cookies dropped by us or third parties for a variety of purposes including to operate and personalize the website. Also, cookies may also be used to track how you use the site to target ads to you on other websites.

Third Parties

Our website employs the use the various third-party services. Through the use of our website, these services may place anonymous cookies on the Visitor's browser and may send their own cookies to the Visitor's cookie file. Some of these services include but are not limited to: Google, Facebook, Twitter, Adroll, MailChimp, Sucuri, Intercom and other social networks, advertising agencies, security firewalls, analytics companies and service providers. These services may also collect and use anonymous identifiers such as IP Address, HTTP Referrer, Unique Device Identifier and other non-personally identifiable information and server logs.