Which two message types will trigger this DLP scan rule?

Refer to the exhibits which shows a DLP scan profile configuration (DLP Scan Rule 1 and DLP Scan Rule 2) from a FortiMail device. Which two message types will trigger this DLP scan rule? (Choose two.)A . An email that contains credit card numbers in the body, attachment, and subject...

September 1, 2023 No Comments READ MORE +

Which two statements correctly describe how an email message is delivered from User A to User B?

Refer to the exhibit, which shows a topology diagram of two separate email domains. Which two statements correctly describe how an email message is delivered from User A to User B? (Choose two.) A. mx.example1.org will forward the email message to the MX record that has the lowest preference. B....

August 30, 2023 No Comments READ MORE +

Which configuration change must you make to prevent the banner from displaying the FortiMail serial number?

Refer to the exhibit which shows a command prompt output of a telnet command. Which configuration change must you make to prevent the banner from displaying the FortiMail serial number?A . Change the host name B. Add a protected domain C. Configure a local domain name D. Change the operation...

August 29, 2023 No Comments READ MORE +

Which message size limit in KB will the FortiMail apply to outbound email?

Refer to the exhibits showing SMTP limits (Session Profile ― SMTP Limits), and domain settings (Domain Settings, and Domain Settings ― Other) of a FortiMail device. Which message size limit in KB will the FortiMail apply to outbound email?A . 204300 B. There is no message size limit for outbound...

August 29, 2023 No Comments READ MORE +

If none of the senders is authenticated, which two envelope addresses will require an access receive rule?

A FortiMail device is configured with the protected domain example.com. If none of the senders is authenticated, which two envelope addresses will require an access receive rule? (Choose two.)A . MAIL FROM: [email protected] RCPT TO: [email protected] B. MAIL FROM: [email protected] RCPT TO: [email protected] C. MAIL FROM: [email protected] RCPT TO: [email protected]...

August 27, 2023 No Comments READ MORE +

On this FortiMail, which two envelope addresses are considered incoming?

A FortiMail is configured with the protected domain example.com. On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)A . MAIL FROM: [email protected] RCPT TO: [email protected] B. MAIL FROM: [email protected] RCPT TO: [email protected] C. MAIL FROM: [email protected] RCPT TO: [email protected] D. MAIL FROM: [email protected] RCPT TO: [email protected] AnswerAnswer:...

August 25, 2023 No Comments READ MORE +

What are two correct observations about this SMTP session?

Refer to the exhibit which shows the output of an email transmission using a telnet session. What are two correct observations about this SMTP session? (Choose two.)A . The SMTP envelope addresses are different from the message header addresses. B. The "250 Message accepted for delivery" message is part of...

August 24, 2023 No Comments READ MORE +

Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)

Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)A . Policy configuration changes of all cluster members from the primary device. B. Mail statistics of all cluster members on the primary device. C. Cross-device log searches across all cluster members from the primary device....

August 24, 2023 No Comments READ MORE +

Which two settings should be used to configure the access receive rule?

Refer to the exhibits which show a topology diagram (Topology), and a configuration element (Access Control Rule). An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain. Which two settings should be used to configure the access receive rule? (Choose two.)A . The Sender IP/netmask...

August 21, 2023 No Comments READ MORE +

What option can the administrator configure to prevent these types of attacks?

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?A . Impersonation analysis B. Dictionary profile with predefined smart identifiers C. Bounce tag verification D. Content disarm and reconstructionView...

August 21, 2023 No Comments READ MORE +