Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which statement about how impersonation analysis identifies spoofed email addresses is correct?

A.

It uses behavior analysis to detect spoofed addresses.

B.

It uses DMARC validation to detect spoofed addresses.

C.

It maps the display name to the correct recipient email address

D.

It uses SPF validation to detect spoofed addresses.

What are Two reasons for having reliable DNS servers configured on FortiMail? (Choose two.)

A.

Email transmission

B.

Firmware updates

C.

FortiGuard Connectivity

D.

HA synchronization

Exhibit.

Refer to the exhibit, which shows the mail server settings of a FortiMail device. What are two ways this FortiMail device will handle connections? (Choose two.)

A.

FortiMail will support the STARTTLS extension.

B.

FortiMail will drop any inbound plaintext SMTP connection.

C.

FortiMail will accept SMTPS connections.

D.

FortiMail will enforce SMTPS on all outbound sessions.

Refer to the exhibit, which shows a few lines of FortiMail logs.

Based on these log entries, which two statements describe the operational status of this FortiMail device? (Choose two.)

A.

FortiMail is experiencing issues accepting the connection from the external. lab MTA.

B.

FortiMail is experiencing issues delivering the email to the internal. lab MTA.

C.

The FortiMail device is in server mode.

D.

The FortiMail device is in gateway or transparent mode.

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?

A.

Impersonation analysis

B.

Dictionary profile with predefined smart identifiers

C.

Bounce tag verification

D.

Content disarm and reconstruction

In which two ways does a transparent mode FortiMail use the build-it MTA to process email? (Choose two.)

A.

It can queue undeliverable messages and generate DSNs.

B.

The built-in MTA must connect to an external relay host to deliver email.

C.

MUAs must be configured to connect to the built-in MTA to send email.

D.

It ignores the destination set by the sender and uses its own MX record lookup.

Refer to the exhibits, which show a topology diagram (Topology) and a configuration element (IP Policy).

An administrator has enabled the sender reputation feature in the Example_Session profile on FML-1. After a few hours, the deferred queue on the mail server starts filling up with undeliverable email.

Which two changes must theadministrator make to fix this issue? (Choose two.)

A.

Disable the exclusive flag in IP policy ID 1.

B.

Apply a session profile with sender reputation disabled on a separate IP policy for outbound sessions.

C.

Clear the sender reputation database using the CLI.

D.

Create an outbound recipient policy to bypass outbound email from session profile inspections.

Refer to the exhibit, which shows an inbound recipient policy.

After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.

What must the administrator do to enforce authentication?

A.

Move this incoming recipient policy to the top of the list.

B.

Configure a matching IP policy with the exclusive flag enabled.

C.

Configure an access delivery rule to enforce authentication.

D.

Configure an access receive rule toverifyauthentication status.

Refer to the exhibit, which shows the Authentication Reputation list on a FortiMail device running in gateway mode.

Why was the IP address blocked?

A.

The IP address had consecutive SMTPS login failures to FortiMail..

B.

The IP address had consecutive IMAP login failures to FortiMail.

C.

The IP address had consecutive administrative password failures to FortiMail.

D.

The IP address had consecutive SSH login failures to FortiMail.

Which SMTP command lists (he supported SMTP service extensions of the recipient MTA?

A.

DATA

B.

VRFY

C.

EHLO

D.

HELO