Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

NSE6_FML-7.2 Fortinet NSE 6 - FortiMail 7.2 Questions and Answers

Questions 4

Refer to the exhibits which show a topology diagram (Topology), and a configuration element (Access Control Rule).

An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain.

Which two settings should be used to configure the access receive rule? (Choose two.)

Options:

A.

The Sender IP/netmask should be set to 10.29.1.0/24.

B.

The Action should be set to Reject

C.

The Recipient pattern should be set to • @example. com.

D.

The Authentication status should be set to Authenticated

Buy Now
Questions 5

While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9:INTERNAL.

Which two statements describe what this policy ID means? (Choose two.)

Options:

A.

Access control policy number 9 was used.

B.

The FortiMail configuration is missing an access delivery rule.

C.

The email was processed using IP-based policy ID 4.

D.

FortiMail is applying the default behavior for relaying inbound email.

Buy Now
Questions 6

Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment.

Which IP address must the DNS MX record for this organization resolve to?

Options:

A.

1172 16 32 57

B.

172.16.32.56

C.

172.16.32.55

D.

172.16.32.1

Buy Now
Questions 7

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?

Options:

A.

Impersonation analysis

B.

Dictionary profile with predefined smart identifiers

C.

Bounce tag verification

D.

Content disarm and reconstruction

Buy Now
Questions 8

Refer to the exhibits which shows a DLP scan profile configuration (DLP Scan Rule 1 and DLP Scan Rule 2) from a FortiMail device.

Which two message types will trigger this DLP scan rule? (Choose two.)

Options:

A.

An email that contains credit card numbers in the body, attachment, and subject will trigger this scan rule.

B.

An email sent from salesdinternal. lab will trigger this scan rule, even without matching any conditions.

C.

An email message with a subject that contains the term "credit card' will trigger this scan rule.

D.

An email message that contains credit card numbers in the body will trigger this scan rule.

Buy Now
Questions 9

Refer to the exhibit which shows an nslookup output of MX records of the example.com domain.

Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)

Options:

A.

mx.example.com will receive approximately twice the number of email as mx.hosted.com because of its preference value.

B.

The primary MTA for the example.com domain is mx.hosted.com.

C.

The external MTAs will send email to mx.example.com only if mx.hosted.com is unreachable.

D.

The PriNS server should receive all email for the example.com domain.

Buy Now
Exam Code: NSE6_FML-7.2
Exam Name: Fortinet NSE 6 - FortiMail 7.2
Last Update: May 5, 2024
Questions: 31
NSE6_FML-7.2 pdf

NSE6_FML-7.2 PDF

$28  $80
NSE6_FML-7.2 Engine

NSE6_FML-7.2 Testing Engine

$33.25  $95
NSE6_FML-7.2 PDF + Engine

NSE6_FML-7.2 PDF + Testing Engine

$45.5  $130