Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Fortinet > Public Cloud Security > FCP_FML_AD-7.4

FCP_FML_AD-7.4 FCP - FortiMail 7.4 Administrator Question and Answers

Question # 4

Refer to the exhibit which shows annslookupoutput of MX records of theexample.comdomain.

Which two MTA selection behaviors for theexample.comdomain are correct? (Choose two.)

A.

mx.example.com will receive approximately twice the number of email as mx.hosted.com because of its preference value.

B.

The primary MTA for the example.com domain is mx.hosted.com.

C.

The external MTAs will send email to mx.example.com only if mx.hosted.com is unreachable.

D.

The PriNS server should receive all email for the example.com domain.

Full Access
Question # 5

Refer to the exhibit, which displays an encryption profile configuration.

What happens if the attachment size of an IBE email exceeds 1024 KB?

A.

Pull delivery will be used.

B.

The email message will not be delivered.

C.

OTLS will be used.

D.

AES 256 will be used.

Full Access
Question # 6

Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment.

Which IP address must the DNS MX record for this organization resolve to?

A.

1172 16 32 57

B.

172.16.32.56

C.

172.16.32.55

D.

172.16.32.1

Full Access
Question # 7

Exhibit.

Reter to the exhibit, which shows the IBE Encryption page of a FortiMail device. Which user account behavior can you expect from these IBE settings?

A.

After initial registration. IBE users can access the secure portal without authenticating again for 90 days.

B.

Registered IBE users have 90 days from the time they receive a notification email message to access their IBE email.

C.

IBE user accounts will expire after 90 days of inactivity and must register again to access new IBE email message.

D.

First time IBE users must register to access their email within 90 days of receiving the notification email message

Full Access
Question # 8

Refer to the exhibit.

What does the Scan timeout value configure?

A.

How long FortiMail will waitfor a scan result from FortiSandbox

B.

How often the local scan results cache will expire on FortiMail

C.

How often FortiMail will query FortiSandbox for a scan result

D.

How long FortiMail will wait to send a file or URI to FortiSandbox

Full Access
Question # 9

A FortiMail device is configured with the protected domain example. com.

It senders are not authenticated, which two envelope addresses will require an access receive rule? (Choose two.)

A.

MALL FROM: mis@hosted.r.et RCPTTO: noc@exampIe.com

B.

MALL FROM: accounts@example.com RCPT TO: aales8biz.example.com

C.

MALL FROM: support6example.org RCPT TO: marketing9exainple.com

D.

MALL FROM: trainingeexample.com RCPT TO: students@external.org

Full Access
Question # 10

Refer to the exhibit, which shows a few lines of FortiMail logs.

Based on these log entries, which two statements describe the operational status of this FortiMail device? (Choose two.)

A.

FortiMail is experiencing issues accepting the connection from the external. lab MTA.

B.

FortiMail is experiencing issues delivering the email to the internal. lab MTA.

C.

The FortiMail device is in server mode.

D.

The FortiMail device is in gateway or transparent mode.

Full Access
Question # 11

Refer to the exhibit, which shows the Authentication Reputation list on a FortiMail device running in gateway mode.

Why was the IP address blocked?

A.

The IP address had consecutive SMTPS login failures to FortiMail..

B.

The IP address had consecutive IMAP login failures to FortiMail.

C.

The IP address had consecutive administrative password failures to FortiMail.

D.

The IP address had consecutive SSH login failures to FortiMail.

Full Access
Question # 12

What are Two reasons for having reliable DNS servers configured on FortiMail? (Choose two.)

A.

Email transmission

B.

Firmware updates

C.

FortiGuard Connectivity

D.

HA synchronization

Full Access
Question # 13

Exhibit.

Refer to the exhibit, which shows the mail server settings of a FortiMail device. What are two ways this FortiMail device will handle connections? (Choose two.)

A.

FortiMail will support the STARTTLS extension.

B.

FortiMail will drop any inbound plaintext SMTP connection.

C.

FortiMail will accept SMTPS connections.

D.

FortiMail will enforce SMTPS on all outbound sessions.

Full Access
Question # 14

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?

A.

Impersonation analysis

B.

Dictionary profile with predefined smart identifiers

C.

Bounce tag verification

D.

Content disarm and reconstruction

Full Access
Question # 15

An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas. Which FortiMail feature specific to server mode can be used to accomplish this?

A.

Access profiles

B.

Domain-level service settings

C.

Resource profiles.

D.

Email group profiles

Full Access