Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)
A.
IP reputation
B.
Spam outbreak protection
C.
DNSBL
D.
Behavior analysis
Answer:
ab
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
Refer to the exhibit, which shows a few lines of FortiMail logs. Based on these log entries, which two statements correctly describe the operational status of this FortiMail device? (Choose two.)
A.
FortiMail is experiencing issues delivering the email to the internal.lab MTA.
B.
The FortiMail device is in sever mode.
C.
The FortiMail device is in gateway or transparent mode.
D.
FortiMail is experiencing issues accepting the connection from the external.lab MTA.
Answer:
ac
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
Refer to the exhibit, which shows a topology diagram of two separate email domains. Which two statements correctly describe how an email message is delivered from User A to User B? (Choose two.)
A.
mx.example1.org will forward the email message to the MX record that has the lowest preference.
B.
User B will retrieve the email message using either POP3 or IMAP.
C.
User As MUA will perform a DNS MX record lookup to send the email message.
D.
The DNS server will act as an intermediary MTA.
Answer:
ab
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
Refer to the exhibit which shows an nslookup output of MX records of the example.com domain. Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)
A.
mx.example.com will receive approximately twice the number of email as mx.hosted.com because of its preference value.
B.
The primary MTA for the example.com domain is mx.hosted.com.
C.
The external MTAs will send email to mx.example.com only if mx.hosted.com is unreachable.
D.
The PriNS server should receive all email for the example.com domain.
Answer:
bc
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
Refer to the exhibit which displays a history log entry. Why does the last field show SYSTEM in the Policy ID column?
A.
The email was dropped by a system blocklist.
B.
It is an inbound email.
C.
The email matched a system-level authentication policy.
D.
The email did not match a recipient-based policy.
Answer:
d
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
In which FortiMail configuration object can you assign an outbound session profile?
A.
Outbound recipient policy
B.
Inbound recipient policy
C.
IP policy
D.
Access delivery rule
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
Refer to the exhibit which displays a topology diagram. Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)
A.
If port1 is required to process SMTP traffic, it must be configured as a routed interface.
B.
All bridge member interfaces belong to the same subnet as the management IP.
C.
The management IP is permanently tied to port1, and port1 cannot be removed from the bridge.
D.
Any bridge member interface can be removed from the bridge and configured as a routed interface.
Answer:
bc
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
Refer to the exhibit which shows a command prompt output of a telnet command. Which configuration change must you make to prevent the banner from displaying the FortiMail serial number?
A.
Change the host name
B.
Add a protected domain
C.
Configure a local domain name
D.
Change the operation mode
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
Refer to the exhibits which show a topology diagram (Topology) and a configuration element (Access Control Rule). Which three access control settings are recommended to allow outbound email from the example.com domain on FML-1? (Choose three.)
A.
The Sender IP/netmask should be set to 10.29.1.45/32.
B.
The Recipient pattern should be set to 10.29.1.45/24.
C.
The Action should be set to Relay.
D.
The Sender pattern should be set to *@example.com.
E.
The Enable check box should be cleared.
Answer:
acd
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 10
Which item is a supported one-time secure token for IBE authentication?