Refer to the exhibit.
Why was the IP address blocked by FortiMail?
Answer : C
Reference: https://docs.fortinet.com/document/fortimail/7.2.0/administration-guide/489179/configuring-authentication-reputation
Refer to the exhibit.
Which two statements about this SMTP session are true? (Choose two.)
Answer : BD
Refer to the exhibit.
An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain.
Which two settings should be used to configure the access receive rule? (Choose two.)
Answer : AB
Refer to the exhibit.
What is the expected outcome of SMTP sessions sourced from FML1 and destined for FML2?
Answer : B
Refer to the exhibit.
Based on the logs shown in the exhibit, which two statements are true? (Choose two.)
Answer : AD
An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas.
Which FortiMail feature specific to server mode can be used to accomplish this?
Answer : C
Refer to the exhibit.
Which statement describes the pre-registered status of the IBE user [email protected]?
Answer : D
Refer to the exhibit.
Which two actions did FortiMail take on this email message? (Choose two.)
Answer : AD
Which item is a supported one-time secure token for IBE authentication?
Answer : C
Reference: https://docs.fortinet.com/document/fortimail/7.2.0/administration-guide/470401/configuring-ibe-users
Refer to the exhibit.
Which two statements describe the built-in bridge on a FortiMail operating in transparent mode? (Choose two.)
Answer : AC
Refer to the exhibit.
Which message size limit will FortiMail apply to the outbound email?
Answer : A
Refer to the exhibit.
Why does the last field show SYSTEM in the Policy ID column?
Answer : C
Refer to the exhibit.
It is recommended that you configure which three access receive settings to allow outbound email from the example.com domain on FML-1? (Choose three.)
Answer : ACD
What are two disadvantages of setting the Dictionary and DLP scan rule aggressiveness too high? (Choose two.)
Answer : BD
Refer to the exhibit.
After creating the policy shown in the exhibit, an administrator discovers that clients are able to send unauthenticated email using SMTP.
What must the administrator do to enforce authentication?
Answer : B