Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Fortinet NSE6_FML-6.4 - Fortinet NSE 6 - FortiMail 6.4

Page: 1 / 2
Total 56 questions

Which three statements about SMTPS and SMTP over TLS are true? (Choose three.)

A.

SMTP over TLS connections are entirely encrypted and initiated on port 465

B.

SMTPS encrypts the identities of both the sender and receiver

C.

The STARTTLS command is used to initiate SMTP over TLS

D.

SMTPS encrypts only the body of the email message

E.

SMTPS connections are initiated on port 465

Which statement about how impersonation analysis identifies spoofed email addresses is correct?

A.

It uses behavior analysis to detect spoofed addresses.

B.

It maps the display name to the correct recipient email address.

C.

It uses DMARC validation to detect spoofed addresses.

D.

It uses SPF validation to detect spoofed addresses.

Which two CLI commands, if executed, will erase all data on the log disk partition? (Choose two.)

A.

execute formatmaildisk

B.

execute formatmaildisk_backup

C.

execute formatlogdisk

D.

execute partitionlogdisk 40

Refer to the exhibit.

MTA-1 is delivering an email intended for User 1 to MTA-2.

Which two statements about protocol usage between the devices are true? (Choose two.)

A.

User 1 will use logs were generated load the email message from MTA-2

B.

MTA-2 will use IMAP to receive the email message from MTA-1

C.

MTA-1 will use POP3 to deliver the email message to User 1 directly

D.

MTA-1 will use SMTP to deliver the email message to MTA-2

Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)

A.

Policy configuration changes of all cluster members from the primary device.

B.

Firmware update of all cluster members from the primary device.

C.

Cross-device log searches across all cluster members from the primary device.

D.

Mail statistics of all cluster members on the primary device.

Refer to the exhibit.

It is recommended that you configure which three access receive settings to allow outbound email from the

example.com domain on FML-1? (Choose three.)

A.

The Sender pattern should be set to *@example.com

B.

The Action should be set to Relay

C.

The Recipient pattern should be set to 10.29.1.45/24

D.

The Enable check box should be cleared

E.

The Sender IP/netmask should be set to 10.29.1.45/32

Refer to the exhibit.

Which two statements about the access receive rule are true? (Choose two.)

A.

Email matching this rule will be relayed

B.

Email must originate from an example.com email address to match this rule

C.

Senders must be authenticated to match this rule

D.

Email from any host in the 10.0.1.0/24 subnet can match this rule

While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9.

Which two scenarios will generate this policy ID? (Choose two.)

A.

Email was processed using IP policy ID 4

B.

Incoming recipient policy ID 9 has the exclusive flag set

C.

FortiMail applies the default behavior for relaying inbound email

D.

FortiMail configuration is missing an access delivery rule

Examine the FortiMail topology and access receive rule shown in the exhibit; then answer the question below.

An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain. Which of the following settings should be used to configure the access receive rule? (Choose two.)

A.

The Sender IP/netmask should be set to 10.29.1.0/24

B.

The Authentication status should be set to Authenticated

C.

The Recipient pattern should be set o *@example.com

D.

The Action should be set to Reject

Examine the message column of a log cross search result of an inbound email shown in the exhibit; then answer the question below

Based on logs, which of the following statements are true? (Choose two.)

A.

The FortiMail is experiencing issues delivering the email to the back-end mail server

B.

The logs were generated by a server mode FortiMail

C.

The logs were generated by a gateway or transparent mode FortiMail

D.

The FortiMail is experiencing issues accepting the connection from the remote sender