Fortinet Related Exams
NSE6_FML-6.4 Exam
Examine the FortiMail topology and access receive rule shown in the exhibit; then answer the question below.


An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain. Which of the following settings should be used to configure the access receive rule? (Choose two.)
Examine the message column of a log cross search result of an inbound email shown in the exhibit; then answer the question below

Based on logs, which of the following statements are true? (Choose two.)
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks.
What option can the administrator configure to prevent these types of attacks?