Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

FCP_FML_AD-7.4 FCP - FortiMail 7.4 Administrator Questions and Answers

Questions 4

Refer to the exhibits, which display a topology diagram (Topology) and two FortiMail device configurations (FML1 ConfigurationandFML2 Configuration).

What is the expected outcome of SMTP sessions sourced from FML1 and destined for FML2?

Options:

A.

FML1 will fail to establish any connection with FML2.

B.

FML1 will attempt to establish an SMTPS session with FML2. but fail and revert to standard SMTP.

C.

FML1 will send the STARTTLS command in the SMTP session, which will be rejected by FML2.

D.

FML1 will successfully establish an SMTPS session with FML2.

Buy Now
Questions 5

In which two places can the maximum email size be overridden on FortiMail? (Choose two.)

Options:

A.

IP Policy configuration

B.

Protected Domain configuration

C.

Resource Profile configuration

D.

Session Profile configuration

Buy Now
Questions 6

Refer to the exhibit which displays a topology diagram.

Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)

Options:

A.

If port1. is required to process SMTP traffic, it must be configured as a routed interface.

B.

All bridge member interfaces belong to the same subnet as the management IP.

C.

The management IP is permanently tied to port1, and port1 cannot be removed from the bridge.

D.

Any bridge member interface can be removed from the bridge and configured as a routed interface.

Buy Now
Questions 7

A FortiMail is configured with the protected domain example.com.

On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)

Options:

A.

EMAIL FROM: nisGhosted.r.et RCPT 70: noceexampIe.com

B.

MAIL FROM: supporteexample.com RCPT TO: marketing@example.com

C.

MAIL FROM: accountsGexample.ccm RCPT TO: sales@external.org

D.

MAIL FROM: training&external.crg RCPT TO: student30extersal.org

Buy Now
Questions 8

Refer to the exhibit, which shows a topology diagram of two MTAs.

MTA-1 is delivering an email intended for User 1 to MTA-2. User 1 uses Outlook as an email client. Which two statements about protocol usage between these devices are correct? (Choose two.)

Options:

A.

User 1 will use IMAP or POP3 to download the email message from MTA-2.

B.

MTA-2 will use IMAP to download the email message from MTA-1.

C.

MTA-1 will use SMTP to deliver the email message to MTA-2.

D.

MTA-1 will use POP3 to deliver the email message to User 1 directly.

Buy Now
Questions 9

Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment.

Which IP address must the DNS MX record for this organization resolve to?

Options:

A.

1172 16 32 57

B.

172.16.32.56

C.

172.16.32.55

D.

172.16.32.1

Buy Now
Questions 10

A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their protected domain. After searching the logs, the administrator identities that the DSNs were not generated because of any outbound email sent from their organization.

Which FortiMail antispam technique can the administrator enable to prevent this scenario?

Options:

A.

Spoofed header detection

B.

Spam outbreak protection.

C.

FortiGuard IP Reputation

D.

Bounce address tag validation

Buy Now
Questions 11

When configuring a FortiMail HA group consisting of different models, which two statements are true? (Choose two.)

Options:

A.

The most powerful model must be configured as the primary unit.

B.

Group capacity is limited to the least powerful model.

C.

All units must have the same firmware.

D.

Configurations will not synchronize between different model types.

Buy Now
Questions 12

What are Two reasons for having reliable DNS servers configured on FortiMail? (Choose two.)

Options:

A.

Email transmission

B.

Firmware updates

C.

FortiGuard Connectivity

D.

HA synchronization

Buy Now
Questions 13

Which three configuration steps must you set to enable DKIM signing for outbound messages on FortiMail? (Choose three.}

Options:

A.

Generate a public/private key pair in the protected domain configuration.

B.

Enable the DKIM checker in a matching session profile.

C.

Publish the public key as a TXT record in a public DNS server.

D.

Enable the DKIM checker in a matching antispam profile.

E.

Enable DKIM signing for outgoing messages in a matching session profile.

Buy Now
Questions 14

Refer to the exhibit.

What does the Scan timeout value configure?

Options:

A.

How long FortiMail will waitfor a scan result from FortiSandbox

B.

How often the local scan results cache will expire on FortiMail

C.

How often FortiMail will query FortiSandbox for a scan result

D.

How long FortiMail will wait to send a file or URI to FortiSandbox

Buy Now
Questions 15

Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)

Options:

A.

IP reputation

B.

Spam outbreak protection

C.

DNSBL

D.

Behavior analysis

Buy Now
Exam Code: FCP_FML_AD-7.4
Exam Name: FCP - FortiMail 7.4 Administrator
Last Update: Aug 1, 2025
Questions: 53
FCP_FML_AD-7.4 pdf

FCP_FML_AD-7.4 PDF

$25.5  $84.99
FCP_FML_AD-7.4 Engine

FCP_FML_AD-7.4 Testing Engine

$30  $99.99
FCP_FML_AD-7.4 PDF + Engine

FCP_FML_AD-7.4 PDF + Testing Engine

$40.5  $134.99