Fortinet NSE 6 - FortiMail 6.4 v1.0 (NSE6_FML-6.4)

Page:    1 / 2   
Total 33 questions

Refer to the exhibit.

Why was the IP address blocked by FortiMail?

  • A. The IP address had consecutive SSH login failures to FortiMail.
  • B. The IP address had consecutive telnet login failures to FortiMail.
  • C. The IP address had consecutive SMTPS login failures to FortiMail.
  • D. The IP address had consecutive HTTPS login failures to FortiMail.


Answer : C

Reference: https://docs.fortinet.com/document/fortimail/7.2.0/administration-guide/489179/configuring-authentication-reputation

Refer to the exhibit.

Which two statements about this SMTP session are true? (Choose two.)

  • A. The "Subject" is part of the message header.
  • B. The "250 Message accepted for delivery" message is part of the message body.
  • C. The "220 mx.internal.lab ESMTP Smtpd" message is part of the SMTP.
    banner.
  • D. The SMTP envelope addresses are different from the message header addresses.


Answer : BD

Refer to the exhibit.

An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain.
Which two settings should be used to configure the access receive rule? (Choose two.)

  • A. The Authentication status should be set to Authenticated.
  • B. The Sender IP/netmask should be set to 10.29.1.0/24.
  • C. The Action should be set to Reject.
  • D. The Recipient pattern should be set to *@example.com.


Answer : AB

Refer to the exhibit.

What is the expected outcome of SMTP sessions sourced from FML1 and destined for FML2?

  • A. FML1 will attempt to establish an SMTPS session with FML2, but revert to standard SMTP.
  • B. FML1 will send the STARTTLS command in the SMTP session, which will be rejected by FML2.
  • C. FML1 will successfully establish an SMTPS session with FML2.
  • D. FML1 will fail to establish any sessions with FML2.


Answer : B

Refer to the exhibit.

Based on the logs shown in the exhibit, which two statements are true? (Choose two.)

  • A. The logs were generated by a server mode FortiMail.
  • B. FortiMail is experiencing issues delivering the email to the back-end mail server.
  • C. The logs were generated by a gateway or transparent mode FortiMail.
  • D. FortiMail is experiencing issues accepting the connection from the remote sender.


Answer : AD

An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas.
Which FortiMail feature specific to server mode can be used to accomplish this?

  • A. Domain-level service settings
  • B. Access profiles
  • C. Resource profiles
  • D. Address book management options


Answer : C

Refer to the exhibit.

Which statement describes the pre-registered status of the IBE user [email protected]?

  • A. The user was registered by an administrator in anticipation of IBE participation.
  • B. The user has completed the IBE registration process, but has not yet accessed their IBE email.
  • C. The user account has been de-activated, and the user must register again the next time they receive an IBE email.
  • D. The user has received an IBE notification email, but has not accessed the HTTPS URL or attachment yet.


Answer : D

Refer to the exhibit.

Which two actions did FortiMail take on this email message? (Choose two.)

  • A. FortiMail sent the email message to User 1's personal quarantine.
  • B. FortiMail replaced the virus content with a message.
  • C. FortiMail forwarded the email to User 1 without scanning.
  • D. FortiMail modified the subject of the email message.


Answer : AD

Which item is a supported one-time secure token for IBE authentication?

  • A. Security question
  • B. FortiToken
  • C. SMS
  • D. Certificate


Answer : C

Reference: https://docs.fortinet.com/document/fortimail/7.2.0/administration-guide/470401/configuring-ibe-users

Refer to the exhibit.

Which two statements describe the built-in bridge on a FortiMail operating in transparent mode? (Choose two.)

  • A. The management IP is permanently tied to port1, and port1 cannot be removed from the bridge.
  • B. If port1 is required to process SMTP traffic, it must be configured as a routed interface.
  • C. Any bridge member interface can be removed from the bridge and configured as a routed interface.
  • D. All bridge member interfaces belong to the same subnet as the management IP.


Answer : AC

Refer to the exhibit.

Which message size limit will FortiMail apply to the outbound email?

  • A. 204800
  • B. 51200
  • C. 1024
  • D. 10240


Answer : A

Refer to the exhibit.

Why does the last field show SYSTEM in the Policy ID column?

  • A. It is an inbound email.
  • B. The email did not match a recipient-based policy.
  • C. The email matched a system-level authentication policy.
  • D. The email was dropped by a system blocklist.


Answer : C

Refer to the exhibit.

It is recommended that you configure which three access receive settings to allow outbound email from the example.com domain on FML-1? (Choose three.)

  • A. The Action should be set to Relay.
  • B. The Sender pattern should be set to *@example.com.
  • C. The Enable check box should be cleared.
  • D. The Sender IP/netmask should be set to 10.29.1.45/32.
  • E. The Recipient pattern should be set to 10.29.1.45/24.


Answer : ACD

What are two disadvantages of setting the Dictionary and DLP scan rule aggressiveness too high? (Choose two.)

  • A. It does not support executable file types.
  • B. False positives are triggered.
  • C. FortiGuard updates require more disk space.
  • D. It is more resource intensive.


Answer : BD

Refer to the exhibit.

After creating the policy shown in the exhibit, an administrator discovers that clients are able to send unauthenticated email using SMTP.
What must the administrator do to enforce authentication?

  • A. Configure an access receive rule to verify authentication status
  • B. Configure a matching IP policy with SMTP authentication and exclusive flag enabled
  • C. Move the recipient policy to the top of the list
  • D. Configure an access delivery rule to enforce authentication


Answer : B

Page:    1 / 2   
Total 33 questions