Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Fortinet FCP_FML_AD-7.4 - FCP - FortiMail 7.4 Administrator

Page: 1 / 2
Total 53 questions

Refer to the exhibit, which shows a topology diagram of two MTAs.

MTA-1 is delivering an email intended for User 1 to MTA-2. User 1 uses Outlook as an email client. Which two statements about protocol usage between these devices are correct? (Choose two.)

A.

User 1 will use IMAP or POP3 to download the email message from MTA-2.

B.

MTA-2 will use IMAP to download the email message from MTA-1.

C.

MTA-1 will use SMTP to deliver the email message to MTA-2.

D.

MTA-1 will use POP3 to deliver the email message to User 1 directly.

Refer to the exhibit, which shows the Authentication Reputation list on a FortiMail device running in gateway mode.

Why was the IP address blocked?

A.

The IP address had consecutive SMTPS login failures to FortiMail..

B.

The IP address had consecutive IMAP login failures to FortiMail.

C.

The IP address had consecutive administrative password failures to FortiMail.

D.

The IP address had consecutive SSH login failures to FortiMail.

A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their protected domain. After searching the logs, the administrator identities that the DSNs were not generated because of any outbound email sent from their organization.

Which FortiMail antispam technique can the administrator enable to prevent this scenario?

A.

Spoofed header detection

B.

Spam outbreak protection.

C.

FortiGuard IP Reputation

D.

Bounce address tag validation

A FortiMail device is configured with the protected domain example. com.

It senders are not authenticated, which two envelope addresses will require an access receive rule? (Choose two.)

A.

MALL FROM: mis@hosted.r.et RCPTTO: noc@exampIe.com

B.

MALL FROM: accounts@example.com RCPT TO: aales8biz.example.com

C.

MALL FROM: support6example.org RCPT TO: marketing9exainple.com

D.

MALL FROM: trainingeexample.com RCPT TO: students@external.org

In which two ways does a transparent mode FortiMail use the build-it MTA to process email? (Choose two.)

A.

It can queue undeliverable messages and generate DSNs.

B.

The built-in MTA must connect to an external relay host to deliver email.

C.

MUAs must be configured to connect to the built-in MTA to send email.

D.

It ignores the destination set by the sender and uses its own MX record lookup.

Refer to the exhibits, which shows a DLP scan profile configuration (DLP Scan Rule 1 and DLP Scan Rule 2) from a FortiMail device.

Which two message types will trigger this DLP scan rule? (Choose two.)

A.

An email that contains credit card numbers in the body, attachment, and subject will trigger this scan rule.

B.

An email sent from sales@internal. lac will trigger this scan rule, even without matching any conditions.

C.

An email message that contains credit card numbers in the body will trigger this scan rule.

D.

An email message with a subject that contains the term 'credit card" will trigger this scan rule.

Which item is a supported one-time secure token for IBE authentication?

A.

FortiToken

B.

Certificate

C.

SMS

D.

Security question

Refer to the exhibit, which displays a history log entry.

In the Policy ID column, why isthe last policy ID value SYSTEM?

A.

The email was dropped by a system blacklist.

B.

The email matched a system-level authentication policy.

C.

It is an inbound email.

D.

The email did not match a recipient-based policy.

Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)

A.

Policy configuration changes of all cluster members from the primary device.

B.

Mail statistics of all cluster members on the primary device.

C.

Cross-device log searches across all cluster members from the primary device.

D.

Firmware update of all cluster members from the primary device

Refer to the exhibits showing SMTP limits (Session Profile — SMTP Limits), and domain settings (Domain Settings, andDomain Settings — Other) of a FortiMail device.

Which message size limit in KB will the FortiMail apply to outbound email?

A.

204300

B.

There is no message size limit for outbound email from a protected domain.

C.

10240

D.

51200