Fortinet NSE6_FML-7.2 - Fortinet NSE 6 - FortiMail 7.2 Exam
Page: 2 / 7
Total 31 questions
Question #6 (Topic: Exam A)
Refer to the exhibit which shows a command prompt output of a telnet command.

Which configuration change must you make to prevent the banner from displaying the FortiMail serial number?

Which configuration change must you make to prevent the banner from displaying the FortiMail serial number?
A. Change the host name
B. Add a protected domain
C. Configure a local domain name
D. Change the operation mode
Answer: A
Question #7 (Topic: Exam A)
Refer to the exhibits which shows a DLP scan profile configuration (DLP Scan Rule 1 and DLP Scan Rule 2) from a FortiMail device.


Which two message types will trigger this DLP scan rule? (Choose two.)


Which two message types will trigger this DLP scan rule? (Choose two.)
A. An email that contains credit card numbers in the body, attachment, and subject will trigger this scan rule.
B. An email sent from [email protected] will trigger this scan rule, even without matching any conditions.
C. An email message with a subject that contains the term “credit card” will trigger this scan rule.
D. An email message that contains credit card numbers in the body will trigger this scan rule.
Answer: CD
Question #8 (Topic: Exam A)
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?
A. Impersonation analysis
B. Dictionary profile with predefined smart identifiers
C. Bounce tag verification
D. Content disarm and reconstruction
Answer: A
Question #9 (Topic: Exam A)
A FortiMail is configured with the protected domain example.com.
On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)
On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)
A. MAIL FROM: [email protected] RCPT TO: [email protected]
B. MAIL FROM: [email protected] RCPT TO: [email protected]
C. MAIL FROM: [email protected] RCPT TO: [email protected]
D. MAIL FROM: [email protected] RCPT TO: [email protected]
Answer: AC
Question #10 (Topic: Exam A)
Refer to the exhibits which show a topology diagram (Topology), and a configuration element (Access Control Rule).


An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain.
Which two settings should be used to configure the access receive rule? (Choose two.)


An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain.
Which two settings should be used to configure the access receive rule? (Choose two.)
A. The Sender IP/netmask should be set to 10.29.1.0/24.
B. The Action should be set to Reject.
C. The Recipient pattern should be set to *@example.com.
D. The Authentication status should be set to Authenticated.
Answer: AD