Refer to the exhibit which shows annslookupoutput of MX records of theexample.comdomain.
Which two MTA selection behaviors for theexample.comdomain are correct? (Choose two.)
Refer to the exhibit, which displays an encryption profile configuration.
What happens if the attachment size of an IBE email exceeds 1024 KB?
Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment.
Which IP address must the DNS MX record for this organization resolve to?
Exhibit.
Reter to the exhibit, which shows the IBE Encryption page of a FortiMail device. Which user account behavior can you expect from these IBE settings?
A FortiMail device is configured with the protected domain example. com.
It senders are not authenticated, which two envelope addresses will require an access receive rule? (Choose two.)
Refer to the exhibit, which shows a few lines of FortiMail logs.
Based on these log entries, which two statements describe the operational status of this FortiMail device? (Choose two.)
Refer to the exhibit, which shows the Authentication Reputation list on a FortiMail device running in gateway mode.
Why was the IP address blocked?
What are Two reasons for having reliable DNS servers configured on FortiMail? (Choose two.)
Exhibit.
Refer to the exhibit, which shows the mail server settings of a FortiMail device. What are two ways this FortiMail device will handle connections? (Choose two.)
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?
An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas. Which FortiMail feature specific to server mode can be used to accomplish this?