Refer to the exhibit, which shows a few lines of FortiMail logs.
Based on these log entries, which two statements correctly describe the operational status of this FortiMail device? (Choose two.)
Answer : AC
Refer to the exhibits which show a topology diagram (Topology) and a configuration element (Access Control Rule).
Which three access control settings are recommended to allow outbound email from the example.com domain on FML-1? (Choose three.)
Answer : ACD
Refer to the exhibit which shows the Authentication Reputation list on a gateway mode FortiMail device.
Why was the IP address blocked?
Answer : C
Which item is a supported one-time secure token for IBE authentication?
Answer : C
What are two disadvantages of configuring the dictionary and DLP scan rule aggressiveness too high? (Choose two.)
Answer : BC
In which FortiMail configuration object can you assign an outbound session profile?
Answer : A
A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their protected domain. After searching the logs, the administrator identifies that the DSNs were not generated because of any outbound email sent from their organization.
Which FortiMail antispam technique can the administrator use to prevent this scenario?
Answer : D
Refer to the exhibit which shows a detailed history log view.
Which two actions did FortiMail take on this email message? (Choose two.)
Answer : AB
Refer to the exhibit, which shows an inbound recipient policy.
After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.
What must the administrator do to enforce authentication?
Answer : D
Refer to the exhibits, which display a topology diagram (Topology) and two FortiMail device configurations (FML1 Configuration and FML2 Configuration).
What is the expected outcome of SMTP sessions sourced from FML1 and destined for FML2?
Answer : D
Refer to the exhibit which displays a history log entry.
Why does the last field show SYSTEM in the Policy ID column?
Answer : D
Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)
Answer : AB
Which statement about how impersonation analysis identifies spoofed email addresses is correct?
Answer : B
Refer to the exhibit which shows an nslookup output of MX records of the example.com domain.
Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)
Answer : BC
While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9:INTERNAL.
Which two statements describe what this policy ID means? (Choose two.)
Answer : AC