Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NSE6_FML-7.2 Exam Dumps - Fortinet NSE 6 - FortiMail 7.2

Question # 4

Refer to the exhibit, which shows an inbound recipient policy.

After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.

What must the administrator do to enforce authentication?

A.

Move this incoming recipient policy to the top of the list.

B.

Configure a matching IP policy with the exclusive flag enabled.

C.

Configure an access delivery rule to enforce authentication.

D.

Configure an access receive rule to verily authentication status.

Full Access
Question # 5

A FortiMail device is configured with the protected domain example.com.

If none of the senders is authenticated, which two envelope addresses will require an access receive rule? (Choose two.)

A.

MAIL FROM: support@example.org RCPT TO: marketing@example.com

B.

MAIL FROM: mis@hosted.net RCPT TO: noc@example.com

C.

MAIL FROM: accounts@example.com RCPT TO: sales@biz.example.com

D.

MAIL FROM: training@example.com RCPT TO: students@external.org

Full Access
Question # 6

Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)

A.

Policy configuration changes of all cluster members from the primary device.

B.

Mail statistics of all cluster members on the primary device.

C.

Cross-device log searches across all cluster members from the primary device.

D.

Firmware update of all cluster members from the primary device

Full Access
Question # 7

What are two disadvantages of configuring the dictionary and DLP scan rule aggressiveness too high? (Choose two.)

A.

High aggressiveness scan settings do not support executable file types.

B.

It is more resource intensive

C.

More false positives could be detected.

D.

FortiMail requires more disk space for the additional rules.

Full Access
Question # 8

Refer to the exhibit which displays the domain configuration of a transparent mode FortiMail device.

Based on the exhibit, which two sessions are considered incoming sessions? (Choose two.)

A.

DESTINATION IP: 172.16.32.56 MAIL FROM: mis@hosted.net RCPT TO: noc@example.com

B.

DESTINATION IP: 192.168.54.10 MAIL FROM: accounts@example.com RCPT TO: sales@example.com

C.

DESTINATION IP: 10.25.32.15 MAIL FROM: training@example.com RCPT TO: students@external.com

D.

DESTINATION IP: 172.16.32.56 MAIL FROM: support@example.com RCPT TO: marketing@example.com

Full Access
Question # 9

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?

A.

Impersonation analysis

B.

Dictionary profile with predefined smart identifiers

C.

Bounce tag verification

D.

Content disarm and reconstruction

Full Access