Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Refer to the exhibit.

Which message size limit will FortiMail apply to the outbound email?

A.

204800

B.

1024

C.

51200

D.

10240

An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas.

Which FortiMail feature specific to server mode can be used to accomplish this?

A.

Resource profiles

B.

Domain-level service settings

C.

Access profiles

D.

Address book management options

Refer to the exhibit.

What two archiving actions will FortiMail take when email messages match these archive policies? (Choose two.)

A.

FortiMail will save archived email in the journal account

B.

FortiMail will allow only the marketing@example.com account to access the archived email

C.

FortiMail will exempt spam email from archiving

D.

FortiMail will archive email sent from marketing@example.com

Which statement about how impersonation analysis identifies spoofed email addresses is correct?

A.

It uses behavior analysis to detect spoofed addresses.

B.

It maps the display name to the correct recipient email address.

C.

It uses DMARC validation to detect spoofed addresses.

D.

It uses SPF validation to detect spoofed addresses.

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks.

What option can the administrator configure to prevent these types of attacks?

A.

Impersonation analysis

B.

Bounce tag verification

C.

Content disarm and reconstruction

D.

Dictionary profile with predefined smart identifiers

Refer to the exhibit.

Which configuration change must you make to block an offending IP address temporarily?

A.

Add the offending IP address to the system block list

B.

Add the offending IP address to the user block list

C.

Add the offending IP address to the domain block list

D.

Change the authentication reputation setting status to Enable

Refer to the exhibit.

Which two statements about the MTAs of the domain example.com are true? (Choose two.)

A.

The external MTAs will send email to mx.example.com only if mx.hosted.com is unreachable

B.

The PriNS server should receive all email for the example.com domain

C.

The primary MTA for the example.com domain is mx.hosted.com

D.

The higher preference value is used to load balance more email to the mx.example.com MTA

Refer to the exhibit.

It is recommended that you configure which three access receive settings to allow outbound email from the

example.com domain on FML-1? (Choose three.)

A.

The Sender pattern should be set to *@example.com

B.

The Action should be set to Relay

C.

The Recipient pattern should be set to 10.29.1.45/24

D.

The Enable check box should be cleared

E.

The Sender IP/netmask should be set to 10.29.1.45/32

Examine the FortiMail DLP scan rule shown in the exhibit; then answer the question below.

Which of the following statements is true regarding this configuration? (Choose two.)

A.

An email message containing the words “Credit Card” in the subject will trigger this scan rule

B.

If an email is sent from sales@internal.lab the action will be applied without matching any conditions

C.

An email message containing credit card numbers in the body will trigger this scan rule

D.

An email must contain credit card numbers in the body, attachment, and subject to trigger this scan rule

Examine the nslookup output shown in the exhibit; then answer the question below.

Identify which of the following statements is true regarding the example.com domain’s MTAs. (Choose two.)

A.

External MTAs will send email to mx.example.com only if mx.hosted.com is unreachable

B.

The primary MTA for the example.com domain is mx.hosted.com

C.

The PriNS server should receive all email for the example.com domain

D.

The higher preference value is used to load balance more email to the mx.example.com MTA