Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A FortiMail device is configured with the protected domain example.com.

If none of the senders is authenticated, which two envelope addresses will require an access receive rule? (Choose two.)

A.

MAIL FROM: support@example.org RCPT TO: marketing@example.com

B.

MAIL FROM: mis@hosted.net RCPT TO: noc@example.com

C.

MAIL FROM: accounts@example.com RCPT TO: sales@biz.example.com

D.

MAIL FROM: training@example.com RCPT TO: students@external.org

Refer to the exhibits showing SMTP limits (Session Profile — SMTP Limits), and domain settings (Domain Settings, and Domain Settings — Other) of a FortiMail device.

Which message size limit in KB will the FortiMail apply to outbound email?

A.

204300

B.

There is no message size limit for outbound email from a protected domain.

C.

10240

D.

51200

Refer to the exhibit which shows the Authentication Reputation list on a gateway mode FortiMail device.

Why was the IP address blocked?

A.

The IP address had consecutive SMTPS login failures to FortiMail.

B.

The IP address had consecutive IMAP login failures to FortiMail.

C.

The IP address had consecutive SSH, SMTPS, and HTTPS login failures to FortiMail.

D.

The IP address had consecutive administrative password failures to FortiMai

Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment.

Which IP address must the DNS MX record for this organization resolve to?

A.

1172 16 32 57

B.

172.16.32.56

C.

172.16.32.55

D.

172.16.32.1

Refer to the exhibit, which shows an inbound recipient policy.

After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.

What must the administrator do to enforce authentication?

A.

Move this incoming recipient policy to the top of the list.

B.

Configure a matching IP policy with the exclusive flag enabled.

C.

Configure an access delivery rule to enforce authentication.

D.

Configure an access receive rule to verily authentication status.

While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9:INTERNAL.

Which two statements describe what this policy ID means? (Choose two.)

A.

Access control policy number 9 was used.

B.

The FortiMail configuration is missing an access delivery rule.

C.

The email was processed using IP-based policy ID 4.

D.

FortiMail is applying the default behavior for relaying inbound email.

Refer to the exhibit, which shows a few lines of FortiMail logs.

Based on these log entries, which two statements correctly describe the operational status of this FortiMail device? (Choose two.)

A.

FortJMail is experiencing issues delivering the email to the internal.lab MTA.

B.

The FortiMail device is in sever mode.

C.

The FortiMail device is in gateway or transparent mode.

D.

FortiMail is experiencing issues accepting the connection from the external. lab MTA.

Refer to the exhibit which displays a history log entry.

Why does the last field show SYSTEM in the Policy ID column?

A.

The email was dropped by a system blocklist.

B.

It is an inbound email.

C.

The email matched a system-level authentication policy.

D.

The email did not match a recipient-based policy.

An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas.

Which FortiMail feature specific to server mode can be used to accomplish this?

A.

Resource profiles

B.

Domain-level service settings

C.

Access profiles

D.

Address book management options