Fortinet FCP_FML_AD-7.4 FCP – FortiMail 7.4 Administrator Online Training
Fortinet FCP_FML_AD-7.4 Online Training
The questions for FCP_FML_AD-7.4 were last updated at Feb 22,2025.
- Exam Code: FCP_FML_AD-7.4
- Exam Name: FCP - FortiMail 7.4 Administrator
- Certification Provider: Fortinet
- Latest update: Feb 22,2025
Which authentication protocol is commonly used for secure email communication and ensures that emails are encrypted during transmission?
- A . HTTPS
- B . POP3
- C . SMTPS
- D . Telnet
How is the decryption process carried out in identity-based encryption (IBE)?
- A . The sender provides the decryption key to the recipient.
- B . The recipient generates a decryption key based on their private key.
- C . The recipient’s email client automatically decrypts the email.
- D . The sender’s email server decrypts the email before delivery.
Which tasks are involved in configuring secure MTA features in FortiMail? (Choose all that apply)
- A . Enforcing email encryption
- B . Configuring DKIM (DomainKeys Identified Mail)
- C . Enabling SMTP relay restrictions
- D . Implementing SPF and DMARC
A FortiMail device is configured with the protected domain example.com.
If none of the senders is authenticated, which two envelope addresses will require an access receive rule? (Choose two.)
- A . MAIL FROM: [email protected] RCPT TO: [email protected]
- B . MAIL FROM: [email protected] RCPT TO: [email protected]
- C . MAIL FROM: [email protected] RCPT TO: [email protected]
- D . MAIL FROM: [email protected] RCPT TO: [email protected]
Which tasks are involved in configuring identity-based encryption (IBE)? (Select all that apply)
- A . Generating public and private key pairs for users
- B . Setting up a central certificate authority (CA)
- C . Defining user identities based on email addresses
- D . Creating email forwarding rules
- E . Configuring SMTPS for secure email transmission
Which security measures help prevent the spread of malware through email? (Choose all that apply)
- A . Anti-malware scanning
- B . DNSBL
- C . Session-based filtering
- D . Email archiving
What is the primary difference between Server Mode and Transparent Mode in FortiMail?
- A . Server Mode requires direct email delivery, while Transparent Mode acts as a relay.
- B . Server Mode encrypts emails, while Transparent Mode does not.
- C . Server Mode is used for small networks, while Transparent Mode is for large networks.
- D . Server Mode bypasses email scanning, while Transparent Mode enforces it.
Which protocol is primarily responsible for sending and receiving emails between mail servers?
- A . HTTP
- B . FTP
- C . SMTP
- D . SNMP
What are the benefits of session-based email filtering over traditional end-point scanning? (Choose all that apply)
- A . Reduces the load on email servers
- B . Scans emails in real-time, preventing potential threats before they enter the network
- C . Allows for larger email attachments
- D . Reduces the likelihood of false positives
If emails from a particular sender are consistently marked as spam, which FortiMail feature should you check to resolve the issue?
- A . SPF records
- B . Access control rules
- C . IP blacklisting
- D . DKIM (DomainKeys Identified Mail)