Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Fortinet NSE6_FML-7.2 - Fortinet NSE 6 - FortiMail 7.2

Page: 1 / 1
Total 31 questions

Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)

A.

Policy configuration changes of all cluster members from the primary device.

B.

Mail statistics of all cluster members on the primary device.

C.

Cross-device log searches across all cluster members from the primary device.

D.

Firmware update of all cluster members from the primary device

Refer to the exhibits, which display a topology diagram (Topology) and two FortiMail device configurations (FML1 Configuration and FML2 Configuration).

What is the expected outcome of SMTP sessions sourced from FML1 and destined for FML2?

A.

FML1 will fail to establish any connection with FML2.

B.

FML1 will attempt to establish an SMTPS session with FML2. but fail and revert to standard SMTP.

C.

FML1 will send the STARTTLS command in the SMTP session, which will be rejected by FML2.

D.

FML1 will successfully establish an SMTPS session with FML2.

Refer to the exhibits which show a topology diagram (Topology) and a configuration element (Access Control Rule).

Which three access control settings are recommended to allow outbound email from the example.com domain on FML-1? (Choose three.)

A.

The Sender IP/netmask should be set to 10.29.1.45/32.

B.

The Recipient pattern should be set to 10.29.1.45/24

C.

The Action should be set to Relay.

D.

The Sender pattern should be set to *@example.com.

E.

The Enable check box should be cleared.

While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9:INTERNAL.

Which two statements describe what this policy ID means? (Choose two.)

A.

Access control policy number 9 was used.

B.

The FortiMail configuration is missing an access delivery rule.

C.

The email was processed using IP-based policy ID 4.

D.

FortiMail is applying the default behavior for relaying inbound email.

Which statement about how impersonation analysis identifies spoofed email addresses is correct?

A.

It uses behavior analysis to detect spoofed addresses.

B.

It uses DMARC validation to detect spoofed addresses.

C.

It maps the display name to the correct recipient email address

D.

It uses SPF validation to detect spoofed addresses.

Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)

A.

IP reputation

B.

Spam outbreak protection

C.

DNSBL

D.

Behavior analysis

A FortiMail device is configured with the protected domain example.com.

If none of the senders is authenticated, which two envelope addresses will require an access receive rule? (Choose two.)

A.

MAIL FROM: support@example.org RCPT TO: marketing@example.com

B.

MAIL FROM: mis@hosted.net RCPT TO: noc@example.com

C.

MAIL FROM: accounts@example.com RCPT TO: sales@biz.example.com

D.

MAIL FROM: training@example.com RCPT TO: students@external.org

Refer to the exhibit which shows an nslookup output of MX records of the example.com domain.

Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)

A.

mx.example.com will receive approximately twice the number of email as mx.hosted.com because of its preference value.

B.

The primary MTA for the example.com domain is mx.hosted.com.

C.

The external MTAs will send email to mx.example.com only if mx.hosted.com is unreachable.

D.

The PriNS server should receive all email for the example.com domain.

Refer to the exhibits which shows a DLP scan profile configuration (DLP Scan Rule 1 and DLP Scan Rule 2) from a FortiMail device.

Which two message types will trigger this DLP scan rule? (Choose two.)

A.

An email that contains credit card numbers in the body, attachment, and subject will trigger this scan rule.

B.

An email sent from salesdinternal. lab will trigger this scan rule, even without matching any conditions.

C.

An email message with a subject that contains the term "credit card' will trigger this scan rule.

D.

An email message that contains credit card numbers in the body will trigger this scan rule.