Fortinet Related Exams
NSE6_FML-6.4 Exam
Examine the message column of a log cross search result of an inbound email shown in the exhibit; then answer the question below

Based on logs, which of the following statements are true? (Choose two.)
Examine the FortiMail recipient-based policy shown in the exhibit; then answer the question below.

After creating the policy, an administrator discovered that clients are able to send unauthenticated email using SMTP. What must be done to ensure clients cannot send unauthenticated email?
Refer to the exhibit.

Which two statements about email messages sent from User A to User B are correct? (Choose two.)