Which two antispam techniques query FortiGuard for rating information? (Choose two.)

Which two antispam techniques query FortiGuard for rating information? (Choose two.)A . DNSBL B. SURBL C. IP reputation D. URI filterView AnswerAnswer: A,B Explanation: Reference: https://docs.fortinet.com/document/fortimail/6.4.0/administration-guide/352990/configuring- antispam-profiles-and-antispam-action-profiles

November 6, 2022 No Comments READ MORE +

Which two settings should be used to configure the access receive rule?

Refer to the exhibit. An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain. Which two settings should be used to configure the access receive rule? (Choose two.)A . The Recipient pattern should be set to *@example.com B. The Authentication status should be set to...

November 5, 2022 No Comments READ MORE +

Which two FortiMail features can the administrator configure to tackle this issue?

An administrator sees that an excessive amount of storage space on a FortiMail device is being used up by quarantine accounts for invalid users. The FortiMail is operating in transparent mode. Which two FortiMail features can the administrator configure to tackle this issue? (Choose two.)A . Automatic removal of quarantine...

November 5, 2022 No Comments READ MORE +

Which two reasons explain why the last policy ID value is 0?

While testing outbound MTA functionality, an administrator discovers that all outbound email is being processed using policy IDs 1:2:0. Which two reasons explain why the last policy ID value is 0? (Choose two.)A . Outbound email is being rejected B. IP policy ID 2 has the exclusive flag set C....

November 5, 2022 No Comments READ MORE +

Which FortiMail option removes embedded code components in Microsoft Word, while maintaining the original file format?

Which FortiMail option removes embedded code components in Microsoft Word, while maintaining the original file format?A . Behavior analysis B. Impersonation analysis C. Content disarm and reconstruction D. Header analysisView AnswerAnswer: C Explanation: Reference: https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/8c063dd3-bafe- 11e9- a989-00505692583a/fortimail-admin-620.pdf (435)

November 5, 2022 No Comments READ MORE +

What two changes must the administrator make to fix this issue?

Refer to the exhibit. An administrator has enabled the sender reputation feature in the Example_Session profile on FML-1. After a few hours, the deferred queue on the mail server starts filling up with undeliverable email. What two changes must the administrator make to fix this issue? (Choose two.)A . Apply...

November 4, 2022 No Comments READ MORE +

Which two statements about protocol usage between the devices are true?

Refer to the exhibit. MTA-1 is delivering an email intended for User 1 to MTA-2. Which two statements about protocol usage between the devices are true? (Choose two.)A . User 1 will use logs were generated load the email message from MTA-2 B. MTA-2 will use IMAP to receive the...

November 4, 2022 No Comments READ MORE +

Which firmware upgrade method for an active-passive HA cluster ensures service outage is minimal, and there are no unnecessary failovers?

Which firmware upgrade method for an active-passive HA cluster ensures service outage is minimal, and there are no unnecessary failovers?A . Break the cluster, upgrade the units independently, and then form the cluster B. Upgrade both units at the same time C. Upgrade the standby unit, and then upgrade the...

November 1, 2022 No Comments READ MORE +

Which statement describes the impact of setting the User inactivity expiry time option to 90 days?

Refer to the exhibit. Which statement describes the impact of setting the User inactivity expiry time option to 90 days?A . IBE user accounts will expire after 90 days of inactivity, and must register again to access new IBE email message B. Registered IBE users have 90 days from the...

October 31, 2022 No Comments READ MORE +

Which two scenarios will generate this policy ID?

While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9. Which two scenarios will generate this policy ID? (Choose two.)A . Email was processed using IP policy ID 4 B. Incoming recipient policy ID 9 has the exclusive flag set C. FortiMail applies the...

October 31, 2022 No Comments READ MORE +