Exhibit.
Reter to the exhibit, which shows the IBE Encryption page of a FortiMail device. Which user account
behavior can you expect from these IBE settings?
C
A FortiMail is configured with the protected domain example.com.
On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)
B, C
Refer to the exhibit, which shows a few lines of FortiMail logs.
Based on these log entries, which two statements describe the operational status of this FortiMail
device? (Choose two.)
B, D
Refer to the exhibit, which shows the output of an email transmission using a telnet session.
What are two correct observations about this SMTP session? (Choose two.)
B, C
Which license must you apply to a FortiMail device to enable the HA centralized monitoring
features?
B
A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their
protected domain. After searching the logs, the administrator identities that the DSNs were not
generated because of any outbound email sent from their organization.
Which FortiMail antispam technique can the administrator enable to prevent this scenario?
D
Refer to the exhibit, which displays the Mail Settings page of a FortiMail device running in gateway
mode.
In addition to selecting Check External Domain in the MTA-STS service field, what else must an
administrator do to enable MTA-STS?
C
Which two factors are required for an active-active HA configuration of FortiMail in server mode?
(Choose two.)
AD
Refer to the exhibit, which displays an access control rule.
What are two expected behaviors for this access control rule? (Choose two.)
A, B
Reter to the exhibits.
The exhibits display a topology diagram of a FortiMail cluster (Topology) and the primary HA
interface configuration of the Primary FortiMail (HA Interface Configuration)
Which three actions are recommended when configuring the primary FortiMail HA interface?
(Choose three.)
B, C, D