Which CLI command is used to configure SPF records in FortiMail?
Which CLI command is used to configure SPF records in FortiMail?A . config email spfB . set spf-policyC . config policy spfD . config spf settingsView AnswerAnswer: B
Why does the last field show SYSTEM in the Policy ID column?
Refer to the exhibit which displays a history log entry. Why does the last field show SYSTEM in the Policy ID column?A . The email was dropped by a system blocklist.B . It is an inbound email.C . The email matched a system-level authentication policy.D . The email did not...
What is the primary purpose of enforcing email authentication in FortiMail?
What is the primary purpose of enforcing email authentication in FortiMail?A . To enhance email encryption.B . To ensure emails are delivered faster.C . To prevent unauthorized users from sending emails from your domain.D . To reduce the need for access control rules.View AnswerAnswer: C
What is the primary purpose of SMTP (Simple Mail Transfer Protocol) in the context of email communication?
What is the primary purpose of SMTP (Simple Mail Transfer Protocol) in the context of email communication?A . Encrypting email attachmentsB . Tracking email delivery timeC . Sending and receiving emails between mail serversD . Filtering spam emailsView AnswerAnswer: C
What are the benefits of session-based email filtering over traditional end-point scanning? (Choose all that apply)
What are the benefits of session-based email filtering over traditional end-point scanning? (Choose all that apply)A . Reduces the load on email serversB . Scans emails in real-time, preventing potential threats before they enter the networkC . Allows for larger email attachmentsD . Reduces the likelihood of false positivesView AnswerAnswer:...
What are two benefits of having authentication reputation tracking enabled on FortiMail? (Choose two.)
What are two benefits of having authentication reputation tracking enabled on FortiMail? (Choose two.)A . Detects spoofed SMTP header addressesB . Enforces SMTP authenticationC . Tracks offending IP addresses attempting brute force attacksD . Temporarily locks out an attackerView AnswerAnswer: CD
Which part of the email header contains the recipient's email address?
Which part of the email header contains the recipient's email address?A . To fieldB . CC fieldC . From fieldD . Subject fieldView AnswerAnswer: A
Which tasks are involved in configuring secure MTA features in FortiMail? (Choose all that apply)
Which tasks are involved in configuring secure MTA features in FortiMail? (Choose all that apply)A . Enforcing email encryptionB . Configuring DKIM (DomainKeys Identified Mail)C . Enabling SMTP relay restrictionsD . Implementing SPF and DMARCView AnswerAnswer: BCD
In FortiMail, what does the term "Operation Mode" refer to?
In FortiMail, what does the term "Operation Mode" refer to?A . The mode in which the device is powered on.B . The mode in which the device interacts with the FortiManager.C . The way the device processes email traffic and functions within the network.D . The mode in which the...
What is a key advantage of deploying FortiMail in Transparent Mode?
What is a key advantage of deploying FortiMail in Transparent Mode?A . Simplified deployment with minimal changes to existing network infrastructure.B . Enhanced encryption capabilities.C . Increased processing speed of emails.D . Improved email filtering accuracy.View AnswerAnswer: A