Fortinet Related Exams
NSE6_FML-6.4 Exam

Examine the FortiMail topology and access receive rule shown in the exhibit; then answer the question below.
An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain. Which of the following settings should be used to configure the access receive rule? (Choose two.)
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks.
What option can the administrator configure to prevent these types of attacks?
Refer to the exhibit.
What are two expected outcomes if FortiMail applies this antivirus action profile to an email? (Choose two.)