Which two message types will trigger this DLP scan rule?
Refer to the exhibits which shows a DLP scan profile configuration (DLP Scan Rule 1 and DLP Scan Rule 2) from a FortiMail device. Which two message types will trigger this DLP scan rule? (Choose two.)A . An email that contains credit card numbers in the body, attachment, and subject...
Which two statements correctly describe how an email message is delivered from User A to User B?
Refer to the exhibit, which shows a topology diagram of two separate email domains. Which two statements correctly describe how an email message is delivered from User A to User B? (Choose two.) A. mx.example1.org will forward the email message to the MX record that has the lowest preference. B....
Which configuration change must you make to prevent the banner from displaying the FortiMail serial number?
Refer to the exhibit which shows a command prompt output of a telnet command. Which configuration change must you make to prevent the banner from displaying the FortiMail serial number?A . Change the host name B. Add a protected domain C. Configure a local domain name D. Change the operation...
Which message size limit in KB will the FortiMail apply to outbound email?
Refer to the exhibits showing SMTP limits (Session Profile ― SMTP Limits), and domain settings (Domain Settings, and Domain Settings ― Other) of a FortiMail device. Which message size limit in KB will the FortiMail apply to outbound email?A . 204300 B. There is no message size limit for outbound...
If none of the senders is authenticated, which two envelope addresses will require an access receive rule?
A FortiMail device is configured with the protected domain example.com. If none of the senders is authenticated, which two envelope addresses will require an access receive rule? (Choose two.)A . MAIL FROM: [email protected] RCPT TO: [email protected] B. MAIL FROM: [email protected] RCPT TO: [email protected] C. MAIL FROM: [email protected] RCPT TO: [email protected]...
On this FortiMail, which two envelope addresses are considered incoming?
A FortiMail is configured with the protected domain example.com. On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)A . MAIL FROM: [email protected] RCPT TO: [email protected] B. MAIL FROM: [email protected] RCPT TO: [email protected] C. MAIL FROM: [email protected] RCPT TO: [email protected] D. MAIL FROM: [email protected] RCPT TO: [email protected] AnswerAnswer:...
What are two correct observations about this SMTP session?
Refer to the exhibit which shows the output of an email transmission using a telnet session. What are two correct observations about this SMTP session? (Choose two.)A . The SMTP envelope addresses are different from the message header addresses. B. The "250 Message accepted for delivery" message is part of...
Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)
Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)A . Policy configuration changes of all cluster members from the primary device. B. Mail statistics of all cluster members on the primary device. C. Cross-device log searches across all cluster members from the primary device....
Which two settings should be used to configure the access receive rule?
Refer to the exhibits which show a topology diagram (Topology), and a configuration element (Access Control Rule). An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain. Which two settings should be used to configure the access receive rule? (Choose two.)A . The Sender IP/netmask...
What option can the administrator configure to prevent these types of attacks?
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?A . Impersonation analysis B. Dictionary profile with predefined smart identifiers C. Bounce tag verification D. Content disarm and reconstructionView...