Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Fortinet NSE 6 - FortiMail 7.2 Question and Answers

Fortinet NSE 6 - FortiMail 7.2

Last Update May 1, 2024
Total Questions : 31

We are offering FREE NSE6_FML-7.2 Fortinet exam questions. All you do is to just go and sign up. Give your details, prepare NSE6_FML-7.2 free exam questions and then go for complete pool of Fortinet NSE 6 - FortiMail 7.2 test questions that will help you more.

NSE6_FML-7.2 pdf

NSE6_FML-7.2 PDF

$35  $99.99
NSE6_FML-7.2 Engine

NSE6_FML-7.2 Testing Engine

$42  $119.99
NSE6_FML-7.2 PDF + Engine

NSE6_FML-7.2 PDF + Testing Engine

$56  $159.99
Questions 1

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?

Options:

A.  

Impersonation analysis

B.  

Dictionary profile with predefined smart identifiers

C.  

Bounce tag verification

D.  

Content disarm and reconstruction

Discussion 0
Questions 2

Refer to the exhibit, which shows an inbound recipient policy.

After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.

What must the administrator do to enforce authentication?

Options:

A.  

Move this incoming recipient policy to the top of the list.

B.  

Configure a matching IP policy with the exclusive flag enabled.

C.  

Configure an access delivery rule to enforce authentication.

D.  

Configure an access receive rule to verily authentication status.

Discussion 0
Questions 3

Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment.

Which IP address must the DNS MX record for this organization resolve to?

Options:

A.  

1172 16 32 57

B.  

172.16.32.56

C.  

172.16.32.55

D.  

172.16.32.1

Discussion 0
Questions 4

Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)

Options:

A.  

IP reputation

B.  

Spam outbreak protection

C.  

DNSBL

D.  

Behavior analysis

Discussion 0
Questions 5

An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas.

Which FortiMail feature specific to server mode can be used to accomplish this?

Options:

A.  

Resource profiles

B.  

Domain-level service settings

C.  

Access profiles

D.  

Address book management options

Discussion 0
Questions 6

Refer to the exhibit which displays a topology diagram.

Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)

Options:

A.  

If port1. is required to process SMTP traffic, it must be configured as a routed interface.

B.  

All bridge member interfaces belong to the same subnet as the management IP.

C.  

The management IP is permanently tied to port1, and port1 cannot be removed from the bridge.

D.  

Any bridge member interface can be removed from the bridge and configured as a routed interface.

Discussion 0
Questions 7

Refer to the exhibit which displays the domain configuration of a transparent mode FortiMail device.

Based on the exhibit, which two sessions are considered incoming sessions? (Choose two.)

Options:

A.  

DESTINATION IP: 172.16.32.56 MAIL FROM: mis@hosted.net RCPT TO: noc@example.com

B.  

DESTINATION IP: 192.168.54.10 MAIL FROM: accounts@example.com RCPT TO: sales@example.com

C.  

DESTINATION IP: 10.25.32.15 MAIL FROM: training@example.com RCPT TO: students@external.com

D.  

DESTINATION IP: 172.16.32.56 MAIL FROM: support@example.com RCPT TO: marketing@example.com

Discussion 0
Questions 8

Refer to the exhibit which displays a list of IBE users on a FortiMail device.

Which statement describes the pre-registered status of the IBE user extuser2@external.lab?

Options:

A.  

The user has received an IBE notification email, but has not accessed the HTTPS URL or attachment yet.

B.  

The user was registered by an administrator in anticipation of IBE participation.

C.  

The user account has been de-activated, and the user must register again the next time they receive an IBE email.

D.  

The user has completed the IBE registration process, but has not yet accessed their IBE email.

Discussion 0
Questions 9

Refer to the exhibits which shows a DLP scan profile configuration (DLP Scan Rule 1 and DLP Scan Rule 2) from a FortiMail device.

Which two message types will trigger this DLP scan rule? (Choose two.)

Options:

A.  

An email that contains credit card numbers in the body, attachment, and subject will trigger this scan rule.

B.  

An email sent from salesdinternal. lab will trigger this scan rule, even without matching any conditions.

C.  

An email message with a subject that contains the term "credit card' will trigger this scan rule.

D.  

An email message that contains credit card numbers in the body will trigger this scan rule.

Discussion 0