Fortinet Related Exams
FCP_FML_AD-7.4 Exam
Which statement about how impersonation analysis identifies spoofed email addresses is correct?
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?
A FortiMail device is configured with the protected domain example. com.
It senders are not authenticated, which two envelope addresses will require an access receive rule? (Choose two.)