Refer to the exhibit which shows a detailed history log view.
Which two actions did FortiMail take on this email message? (Choose two.)
Refer to the exhibit which displays a topology diagram.
Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)
Refer to the exhibit, which shows the Authentication Reputation list on a FortiMail device running in gateway mode.
Why was the IP address blocked?
Which license must you apply to a FortiMail device to enable the HA centralized monitoring features?
A mail user wants the ability to subscribe or publish to and from their FortiMail calendar using Thunderbird as their mail user agent (MUA). What information does this mail user need from their webmail User Preferences section?
Refer to the exhibit, which displays the domain configuration of a FortiMail device running in transparent mode.
Based on the exhibit, which two sessions are considered incoming sessions? (Choose two.)
Which SMTP command lists (he supported SMTP service extensions of the recipient MTA?
Exhibit.
Refer to the exhibit, which shows the mail server settings of a FortiMail device. What are two ways this FortiMail device will handle connections? (Choose two.)
Refer to the exhibit, which shows a topology diagram of two MTAs.
MTA-1 is delivering an email intended for User 1 to MTA-2. User 1 uses Outlook as an email client. Which two statements about protocol usage between these devices are correct? (Choose two.)
Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)
Refer to the exhibit, which shows an antivirus action profile.
What are two expected outcomes if FortiMail applies this antivirus action profile to an email? (Choose two.)
While testing outbound MTA functionality, an administrator discovers that all outbound email is being processed using policy ID l: 2:0: SYSTEM. What are two possible reasons why the third policy ID value is o? (Choose two.)
A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their protected domain. After searching the logs, the administrator identifies that the DSNs werenotgenerated because of any outbound email sent from their organization.
Which FortiMail antispam technique can the administrator use to prevent this scenario?
A FortiMail device is configured with the protected domain example. com.
It senders are not authenticated, which two envelope addresses will require an access receive rule? (Choose two.)
Refer to the exhibits showing SMTP limits (Session Profile — SMTP Limits), and domain settings (Domain Settings, andDomain Settings — Other) of a FortiMail device.
Which message size limit in KB will the FortiMail apply to outbound email?