Which two scenarios will generate this policy ID?
While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9. Which two scenarios will generate this policy ID? (Choose two.)A . Email was processed using IP policy ID 4 B. Incoming recipient policy ID 9 has the exclusive flag set C. FortiMail applies the...
Which two reasons explain why the last policy ID value is 0?
While testing outbound MTA functionality, an administrator discovers that all outbound email is being processed using policy IDs 1:2:0. Which two reasons explain why the last policy ID value is 0? (Choose two.)A . Outbound email is being rejected B. IP policy ID 2 has the exclusive flag set C....
Which two CLI commands, if executed, will erase all data on the log disk partition? (Choose
Which two CLI commands, if executed, will erase all data on the log disk partition? (Choose two.)A . execute formatmaildisk B. execute formatmaildisk_backup C. execute formatlogdisk D. execute partitionlogdisk 40View AnswerAnswer: C,D Explanation: Reference: https://docs.fortinet.com/document/fortimail/6.2.0/cli-reference/588825/formatlogdisk
Which message size limit will FortiMail apply to the outbound email?
Refer to the exhibit. Which message size limit will FortiMail apply to the outbound email?A . 204800 B. 1024 C. 51200 D. 10240View AnswerAnswer: A
Which two antispam techniques query FortiGuard for rating information? (Choose two.)
Which two antispam techniques query FortiGuard for rating information? (Choose two.)A . DNSBL B. SURBL C. IP reputation D. URI filterView AnswerAnswer: A,B Explanation: Reference: https://docs.fortinet.com/document/fortimail/6.4.0/administration-guide/352990/configuring-antispam-profiles-and-antispam-action-profiles
Which FortiMail option removes embedded code components in Microsoft Word, while maintaining the original file format?
Which FortiMail option removes embedded code components in Microsoft Word, while maintaining the original file format?A . Behavior analysis B. Impersonation analysis C. Content disarm and reconstruction D. Header analysisView AnswerAnswer: C Explanation: Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/8c063dd3-bafe-11e9-a989-00505692583a/fortimail-admin-620.pdf (435)
For the transparent mode FortiMail shown in the exhibit, which two sessions are considered incoming sessions?
Refer to the exhibit. For the transparent mode FortiMail shown in the exhibit, which two sessions are considered incoming sessions? (Choose two.)A . DESTINATION IP: 172.16.32.56 MAIL FROM: [email protected] RCPT TO: [email protected] B. DESTINATION IP: 192.168.54.10 MAIL FROM: [email protected] RCPT TO: [email protected] C. DESTINATION IP: 10.25.32.15 MAIL FROM: [email protected] RCPT...
What option can the administrator configure to prevent these types of attacks?
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?A . Impersonation analysis B. Bounce tag verification C. Content disarm and reconstruction D. Dictionary profile with predefined smart identifiersView...
What three configuration steps are required to enable DKIM signing for outbound messages on FortiMail? (Choose three.)
What three configuration steps are required to enable DKIM signing for outbound messages on FortiMail? (Choose three.)A . Generate a public/private key pair in the protected domain configuration B. Enable DKIM check in a matching session profile C. Enable DKIM check in a matching antispam profile D. Publish the public...
Which FortiMail antispam technique can the administrator use to prevent this scenario?
A FortiMail administrator is investigating a sudden increase in DSNs being delivered to the protected domain for undeliverable email messages. After searching the logs, the administrator identifies that the DSNs were not generated as a result of any outbound email sent from the protected domain. Which FortiMail antispam technique can...