Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Fortinet NSE6_FML-7.2 Dumps

Fortinet NSE 6 - FortiMail 7.2 Questions and Answers

Question 1

Refer to the exhibit which displays a list of IBE users on a FortiMail device.

Which statement describes the pre-registered status of the IBE user extuser2@external.lab?

Options:

A.

The user has received an IBE notification email, but has not accessed the HTTPS URL or attachment yet.

B.

The user was registered by an administrator in anticipation of IBE participation.

C.

The user account has been de-activated, and the user must register again the next time they receive an IBE email.

D.

The user has completed the IBE registration process, but has not yet accessed their IBE email.

Question 2

Refer to the exhibit which displays the domain configuration of a transparent mode FortiMail device.

Based on the exhibit, which two sessions are considered incoming sessions? (Choose two.)

Options:

A.

DESTINATION IP: 172.16.32.56 MAIL FROM: mis@hosted.net RCPT TO: noc@example.com

B.

DESTINATION IP: 192.168.54.10 MAIL FROM: accounts@example.com RCPT TO: sales@example.com

C.

DESTINATION IP: 10.25.32.15 MAIL FROM: training@example.com RCPT TO: students@external.com

D.

DESTINATION IP: 172.16.32.56 MAIL FROM: support@example.com RCPT TO: marketing@example.com

Question 3

In which two places can the maximum email size be overridden on FortiMail? (Choose two.)

Options:

A.

IP Policy configuration

B.

Protected Domain configuration

C.

Resource Profile configuration

D.

Session Profile configuration

Question 4

Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)

Options:

A.

IP reputation

B.

Spam outbreak protection

C.

DNSBL

D.

Behavior analysis

Question 5

Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)

Options:

A.

Policy configuration changes of all cluster members from the primary device.

B.

Mail statistics of all cluster members on the primary device.

C.

Cross-device log searches across all cluster members from the primary device.

D.

Firmware update of all cluster members from the primary device

Question 6

Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment.

Which IP address must the DNS MX record for this organization resolve to?

Options:

A.

1172 16 32 57

B.

172.16.32.56

C.

172.16.32.55

D.

172.16.32.1

Question 7

An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas.

Which FortiMail feature specific to server mode can be used to accomplish this?

Options:

A.

Resource profiles

B.

Domain-level service settings

C.

Access profiles

D.

Address book management options

Question 8

Refer to the exhibit, which shows an inbound recipient policy.

After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.

What must the administrator do to enforce authentication?

Options:

A.

Move this incoming recipient policy to the top of the list.

B.

Configure a matching IP policy with the exclusive flag enabled.

C.

Configure an access delivery rule to enforce authentication.

D.

Configure an access receive rule to verily authentication status.

Question 9

What are two disadvantages of configuring the dictionary and DLP scan rule aggressiveness too high? (Choose two.)

Options:

A.

High aggressiveness scan settings do not support executable file types.

B.

It is more resource intensive

C.

More false positives could be detected.

D.

FortiMail requires more disk space for the additional rules.