Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Fortinet FCP_FML_AD-7.4 Dumps Questions Answers

FCP - FortiMail 7.4 Administrator Questions and Answers

Question 1

An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas. Which FortiMail feature specific to server mode can be used to accomplish this?

Options:

A.

Access profiles

B.

Domain-level service settings

C.

Resource profiles.

D.

Email group profiles

Buy Now
Question 2

Exhibit.

Refer to the exhibit, which shows the mail server settings of a FortiMail device. What are two ways this FortiMail device will handle connections? (Choose two.)

Options:

A.

FortiMail will support the STARTTLS extension.

B.

FortiMail will drop any inbound plaintext SMTP connection.

C.

FortiMail will accept SMTPS connections.

D.

FortiMail will enforce SMTPS on all outbound sessions.

Question 3

A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their protected domain. After searching the logs, the administrator identifies that the DSNs werenotgenerated because of any outbound email sent from their organization.

Which FortiMail antispam technique can the administrator use to prevent this scenario?

Options:

A.

FortiGuard IP Reputation

B.

Spoofed header detection

C.

Spam outbreak protection

D.

Bounce address tag validation

Question 4

Refer to the exhibit, which displays an encryption profile configuration.

What happens if the attachment size of an IBE email exceeds 1024 KB?

Options:

A.

Pull delivery will be used.

B.

The email message will not be delivered.

C.

OTLS will be used.

D.

AES 256 will be used.

Question 5

Which SMTP command lists (he supported SMTP service extensions of the recipient MTA?

Options:

A.

DATA

B.

VRFY

C.

EHLO

D.

HELO

Question 6

A FortiMail device is configured with the protected domain example. com.

It senders are not authenticated, which two envelope addresses will require an access receive rule? (Choose two.)

Options:

A.

MALL FROM: mis@hosted.r.et RCPTTO: noc@exampIe.com

B.

MALL FROM: accounts@example.com RCPT TO: aales8biz.example.com

C.

MALL FROM: support6example.org RCPT TO: marketing9exainple.com

D.

MALL FROM: trainingeexample.com RCPT TO: students@external.org

Question 7

What are two disadvantages of configuring the dictionary and DLP scan rule aggressiveness too high? (Choose two.)

Options:

A.

High aggressiveness scan settings do not support executable file types.

B.

It is more resource intensive

C.

More false positives could be detected.

D.

FortiMail requires more disk space for the additional rules.

Question 8

Refer to the exhibit, which shows the Authentication Reputation list on a FortiMail device running in gateway mode.

Why was the IP address blocked?

Options:

A.

The IP address had consecutive SMTPS login failures to FortiMail..

B.

The IP address had consecutive IMAP login failures to FortiMail.

C.

The IP address had consecutive administrative password failures to FortiMail.

D.

The IP address had consecutive SSH login failures to FortiMail.

Question 9

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?

Options:

A.

Impersonation analysis

B.

Dictionary profile with predefined smart identifiers

C.

Bounce tag verification

D.

Content disarm and reconstruction

Question 10

Which statement about how impersonation analysis identifies spoofed email addresses is correct?

Options:

A.

It uses behavior analysis to detect spoofed addresses.

B.

It uses DMARC validation to detect spoofed addresses.

C.

It maps the display name to the correct recipient email address

D.

It uses SPF validation to detect spoofed addresses.

Question 11

Refer to the exhibit which displays a topology diagram.

Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)

Options:

A.

If port1. is required to process SMTP traffic, it must be configured as a routed interface.

B.

All bridge member interfaces belong to the same subnet as the management IP.

C.

The management IP is permanently tied to port1, and port1 cannot be removed from the bridge.

D.

Any bridge member interface can be removed from the bridge and configured as a routed interface.

Question 12

Refer to the exhibit, which shows an inbound recipient policy.

After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.

What must the administrator do to enforce authentication?

Options:

A.

Move this incoming recipient policy to the top of the list.

B.

Configure a matching IP policy with the exclusive flag enabled.

C.

Configure an access delivery rule to enforce authentication.

D.

Configure an access receive rule toverifyauthentication status.

Question 13

Refer to the exhibit, which shows the output of an email transmission using a telnet session.

What are two correct observations about this SMTP session? (Choose two.)

Options:

A.

The SMTP envelope addresses are different from the message header addresses.

B.

The "Subject" is part of the message header.

C.

The"220 mx. internal, lab ESMTPSmtpd" message is part of the SMTP banner.

D.

The "250Message accepted for delivery" message is part ofthe message body.

Question 14

Refer to the exhibits, which show a topology diagram (Topology) and a configuration element (IP Policy).

An administrator has enabled the sender reputation feature in the Example_Session profile on FML-1. After a few hours, the deferred queue on the mail server starts filling up with undeliverable email.

Which two changes must theadministrator make to fix this issue? (Choose two.)

Options:

A.

Disable the exclusive flag in IP policy ID 1.

B.

Apply a session profile with sender reputation disabled on a separate IP policy for outbound sessions.

C.

Clear the sender reputation database using the CLI.

D.

Create an outbound recipient policy to bypass outbound email from session profile inspections.

Question 15

Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment.

Which IP address must the DNS MX record for this organization resolve to?

Options:

A.

1172 16 32 57

B.

172.16.32.56

C.

172.16.32.55

D.

172.16.32.1