Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Refer to the exhibit which shows an nslookup output of MX records of the example.com domain.

Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)

A.

mx.example.com will receive approximately twice the number of email as mx.hosted.com because of its preference value.

B.

The primary MTA for the example.com domain is mx.hosted.com.

C.

The external MTAs will send email to mx.example.com only if mx.hosted.com is unreachable.

D.

The PriNS server should receive all email for the example.com domain.

Full Access
Question # 5

Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)

A.

IP reputation

B.

Spam outbreak protection

C.

DNSBL

D.

Behavior analysis

Full Access
Question # 6

Refer to the exhibit which displays a history log entry.

Why does the last field show SYSTEM in the Policy ID column?

A.

The email was dropped by a system blocklist.

B.

It is an inbound email.

C.

The email matched a system-level authentication policy.

D.

The email did not match a recipient-based policy.

Full Access
Question # 7

Refer to the exhibit, which shows an inbound recipient policy.

After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.

What must the administrator do to enforce authentication?

A.

Move this incoming recipient policy to the top of the list.

B.

Configure a matching IP policy with the exclusive flag enabled.

C.

Configure an access delivery rule to enforce authentication.

D.

Configure an access receive rule to verily authentication status.

Full Access
Question # 8

Which statement about how impersonation analysis identifies spoofed email addresses is correct?

A.

It uses behavior analysis to detect spoofed addresses.

B.

It uses DMARC validation to detect spoofed addresses.

C.

It maps the display name to the correct recipient email address

D.

It uses SPF validation to detect spoofed addresses.

Full Access
Question # 9

In which two places can the maximum email size be overridden on FortiMail? (Choose two.)

A.

IP Policy configuration

B.

Protected Domain configuration

C.

Resource Profile configuration

D.

Session Profile configuration

Full Access