Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Fortinet FCP_FML_AD-7.4 FCP - FortiMail 7.4 Administrator Exam Practice Test

Page: 1 / 5
Total 53 questions

FCP - FortiMail 7.4 Administrator Questions and Answers

Question 1

A mail user wants the ability to subscribe or publish to and from their FortiMail calendar using Thunderbird as their mail user agent (MUA). What information does this mail user need from their webmail User Preferences section?

Options:

A.

Free busy URL

B.

Service URLs

C.

Secondary account configurations

D.

Message tags

Question 2

Refer to the exhibit, which displays a history log entry.

Question # 2

In the Policy ID column, why isthe last policy ID value SYSTEM?

Options:

A.

The email was dropped by a system blacklist.

B.

The email matched a system-level authentication policy.

C.

It is an inbound email.

D.

The email did not match a recipient-based policy.

Question 3

While testing outbound MTA functionality, an administrator discovers that all outbound email is being processed using policy ID l: 2:0: SYSTEM. What are two possible reasons why the third policy ID value is o? (Choose two.)

Options:

A.

IP policy ID 2 has the exclusive flag set.

B.

There are no outgoing recipient policies configured.

C.

Outbound email is being rejected.

D.

There are no access delivery rules configured for outbound email.

Question 4

Refer to the exhibit which shows a command prompt output of a telnet command.

Question # 4

Which configuration change must you make to prevent the banner from displaying the FortiMail serial number?

Options:

A.

Change the host name

B.

Add a protected domain

C.

Configure a local domain name

D.

Change the operation mode

Question 5

When configuring a FortiMail HA group consisting of different models, which two statements are true? (Choose two.)

Options:

A.

The most powerful model must be configured as the primary unit.

B.

Group capacity is limited to the least powerful model.

C.

All units must have the same firmware.

D.

Configurations will not synchronize between different model types.

Question 6

Refer to the exhibit, which shows a partial antispam profile configuration.

Question # 6

What will happen to an email that triggers Spam outbreak protection?

Options:

A.

The email is logged.

B.

The email is rejected.

C.

The email is held in a deferred queue for a period of time.

D.

The email is marked as clean and released to the recipient.

Question 7

What are two disadvantages of configuring the dictionary and DLP scan rule aggressiveness too high? (Choose two.)

Options:

A.

High aggressiveness scan settings do not support executable file types.

B.

It is more resource intensive

C.

More false positives could be detected.

D.

FortiMail requires more disk space for the additional rules.

Question 8

A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their protected domain. After searching the logs, the administrator identifies that the DSNs werenotgenerated because of any outbound email sent from their organization.

Which FortiMail antispam technique can the administrator use to prevent this scenario?

Options:

A.

FortiGuard IP Reputation

B.

Spoofed header detection

C.

Spam outbreak protection

D.

Bounce address tag validation

Question 9

Refer to the exhibit which shows a detailed history log view.

Question # 9

Which two actions did FortiMail take on this email message? (Choose two.)

Options:

A.

FortJMail replaced the virus content with a message

B.

FortiMail modified the subject of the email message.

C.

FortiMail forwarded the email to User 1 without scanning.

D.

FortiMail sent the email message to User 1's personal quarantine.

Question 10

Refer to the exhibit, which shows a few lines of FortiMail logs.

Question # 10

Based on these log entries, which two statements describe the operational status of this FortiMail device? (Choose two.)

Options:

A.

FortiMail is experiencing issues accepting the connection from the external. lab MTA.

B.

FortiMail is experiencing issues delivering the email to the internal. lab MTA.

C.

The FortiMail device is in server mode.

D.

The FortiMail device is in gateway or transparent mode.

Question 11

In which two places can the maximum email size be overridden on FortiMail? (Choose two.)

Options:

A.

IP Policy configuration

B.

Protected Domain configuration

C.

Resource Profile configuration

D.

Session Profile configuration

Question 12

Refer to the exhibit, which displays an access control rule.

Question # 12

What are two expected behaviors for this access control rule? (Choose two.)

Options:

A.

Email must originate from an example. com email address.

B.

Senders must be authenticated to match this rule.

C.

Email matching this rule will be relayed.

D.

Emails must be sent from the 10.0.1.0/24 subnet.

Question 13

Refer to the exhibits showing SMTP limits (Session Profile — SMTP Limits), and domain settings (Domain Settings, andDomain Settings — Other) of a FortiMail device.

Question # 13

Question # 13

Question # 13

Which message size limit in KB will the FortiMail apply to outbound email?

Options:

A.

204300

B.

There is no message size limit for outbound email from a protected domain.

C.

10240

D.

51200

Question 14

Question # 14

Question # 14

Refer to the exhibits, which shows a DLP scan profile configuration (DLP Scan Rule 1 and DLP Scan Rule 2) from a FortiMail device.

Which two message types will trigger this DLP scan rule? (Choose two.)

Options:

A.

An email that contains credit card numbers in the body, attachment, and subject will trigger this scan rule.

B.

An email sent from sales@internal. lac will trigger this scan rule, even without matching any conditions.

C.

An email message that contains credit card numbers in the body will trigger this scan rule.

D.

An email message with a subject that contains the term 'credit card" will trigger this scan rule.

Question 15

Refer to the exhibit, which shows a topology diagram of two separate email domains.

Question # 15

Which two statements correctly describe how an email message is delivered from User A to User B? (Choose two.)

Options:

A.

mx.example1.org will forward the email message to the MX record that has the lowest preference.

B.

User B will retrieve the email message using either POP3 or IMAP.

C.

User A’s MUA will perform a DNS MX record lookup to send the email message.

D.

The DNS server will act as an intermediary MTA.

Page: 1 / 5
Total 53 questions