Examine the FortiMail session profile and protected domain configuration shown in the exhibit; then answer the question below.
Answer : A
Examine the FortiMail antivirus action profile shown in the exhibit; then answer the question below.
Answer : BC
Examine the FortiMail recipient-based policy shown in the exhibit; then answer the question below.
Answer : A
FortiMail is configured with the protected domain "example.com". Identify which of the following envelope addresses will require an access receive rule to relay for unauthenticated senders? (Choose two.)
Answer : CD
Examine the nslookup output shown in the exhibit; then answer the question below.
Answer : CD
What are the configuration steps to enable DKIM signing for outbound messages on FortiMail? (Choose three.)
Answer : ACE
Examine the FortMail mail server settings shown in the exhibit; then answer the question below.
Answer : AC
Examine the FortiMail active-passive cluster shown in the exhibit; then answer the question below.
Answer : CDE
Which of the following CLI commands, if executed, will erase all data on the log disk partition? (Choose two.)
Answer : CD
Examine the FortiMail IBE users shown in the exhibit; then answer the question below
Answer : C
Examine the access receive rule shown in the exhibit; then answer the question below.
Answer : CD
Which of the following statements are true regarding FortiMail"™s behavior when using the built-in MTA to process email in transparent mode? (Choose two.)
Answer : BC
Answer : C
Examine the FortiMail topology and access receive rule shown in the exhibit; then answer the question below.
Answer : CD
Examine the configured routes shown in the exhibit; then answer the question below.
Answer : A
Have any questions or issues ? Please dont hesitate to contact us