Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

FCP_FML_AD-7.4 Questions and Answers

Question # 6

A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their protected domain. After searching the logs, the administrator identifies that the DSNs werenotgenerated because of any outbound email sent from their organization.

Which FortiMail antispam technique can the administrator use to prevent this scenario?

A.

FortiGuard IP Reputation

B.

Spoofed header detection

C.

Spam outbreak protection

D.

Bounce address tag validation

Full Access
Question # 7

A FortiMail is configured with the protected domain example.com.

On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)

A.

EMAIL FROM: nisGhosted.r.et RCPT 70: noceexampIe.com

B.

MAIL FROM: supporteexample.com RCPT TO: marketing@example.com

C.

MAIL FROM: accountsGexample.ccm RCPT TO: sales@external.org

D.

MAIL FROM: training&external.crg RCPT TO: student30extersal.org

Full Access
Question # 8

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?

A.

Impersonation analysis

B.

Dictionary profile with predefined smart identifiers

C.

Bounce tag verification

D.

Content disarm and reconstruction

Full Access
Question # 9

Refer to the exhibit which displays a topology diagram.

Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)

A.

If port1. is required to process SMTP traffic, it must be configured as a routed interface.

B.

All bridge member interfaces belong to the same subnet as the management IP.

C.

The management IP is permanently tied to port1, and port1 cannot be removed from the bridge.

D.

Any bridge member interface can be removed from the bridge and configured as a routed interface.

Full Access
Question # 10

Refer to the exhibits, which display a topology diagram (Topology) and two FortiMail device configurations (FML1 ConfigurationandFML2 Configuration).

What is the expected outcome of SMTP sessions sourced from FML1 and destined for FML2?

A.

FML1 will fail to establish any connection with FML2.

B.

FML1 will attempt to establish an SMTPS session with FML2. but fail and revert to standard SMTP.

C.

FML1 will send the STARTTLS command in the SMTP session, which will be rejected by FML2.

D.

FML1 will successfully establish an SMTPS session with FML2.

Full Access
Question # 11

Refer to the exhibit, which shows the Authentication Reputation list on a FortiMail device running in gateway mode.

Why was the IP address blocked?

A.

The IP address had consecutive SMTPS login failures to FortiMail..

B.

The IP address had consecutive IMAP login failures to FortiMail.

C.

The IP address had consecutive administrative password failures to FortiMail.

D.

The IP address had consecutive SSH login failures to FortiMail.

Full Access
Question # 12

Refer to the exhibit, which displays a history log entry.

In the Policy ID column, why isthe last policy ID value SYSTEM?

A.

The email was dropped by a system blacklist.

B.

The email matched a system-level authentication policy.

C.

It is an inbound email.

D.

The email did not match a recipient-based policy.

Full Access
Question # 13

Exhibit.

Reter to the exhibit, which shows the IBE Encryption page of a FortiMail device. Which user account behavior can you expect from these IBE settings?

A.

After initial registration. IBE users can access the secure portal without authenticating again for 90 days.

B.

Registered IBE users have 90 days from the time they receive a notification email message to access their IBE email.

C.

IBE user accounts will expire after 90 days of inactivity and must register again to access new IBE email message.

D.

First time IBE users must register to access their email within 90 days of receiving the notification email message

Full Access
Question # 14

In which two ways does a transparent mode FortiMail use the build-it MTA to process email? (Choose two.)

A.

It can queue undeliverable messages and generate DSNs.

B.

The built-in MTA must connect to an external relay host to deliver email.

C.

MUAs must be configured to connect to the built-in MTA to send email.

D.

It ignores the destination set by the sender and uses its own MX record lookup.

Full Access
Question # 15

Refer to the exhibit which shows annslookupoutput of MX records of theexample.comdomain.

Which two MTA selection behaviors for theexample.comdomain are correct? (Choose two.)

A.

mx.example.com will receive approximately twice the number of email as mx.hosted.com because of its preference value.

B.

The primary MTA for the example.com domain is mx.hosted.com.

C.

The external MTAs will send email to mx.example.com only if mx.hosted.com is unreachable.

D.

The PriNS server should receive all email for the example.com domain.

Full Access