Examine the FortiMail session profile and protected domain configuration shown in the exhibit; then answer the question below.
Which size limit will FortiMail apply to outbound email?
A. 204800
B. 51200 C. 1024
D. 10240
Examine the FortiMail recipient-based policy shown in the exhibit; then answer the question below.
After creating the policy, an administrator discovered that clients are able to send unauthenticated email using SMTP. What must be done to ensure clients cannot send unauthenticated email?
A. Configure a matching IP policy with SMTP authentication and exclusive flag enabled
B. Move the recipient policy to the top of the list
C. Configure an access receive rule to verify authentication status
D. Configure an access delivery rule to enforce authentication
FortiMail is configured with the protected domain "example.com". Identify which of the following envelope addresses will require an access receive rule to relay for unauthenticated senders? (Choose two.)
A. MAIL FROM: [email protected] RCPT TO: [email protected]
B. MAIL FROM: [email protected] RCPT TO: [email protected]
C. MAIL FROM: [email protected] RCPT TO: [email protected]
D. MAIL FROM: [email protected] RCPT TO: [email protected]
Examine the nslookup output shown in the exhibit; then answer the question below.
Identify which of the following statements is true regarding the example.com domain's MTAs. (Choose two.)
A. External MTAs will send email to mx.example.com only if mx.hosted.com is unreachable
B. The primary MTA for the example.com domain is mx.hosted.com
C. The PriNS server should receive all email for the example.com domain
D. The higher preference value is used to load balance more email to the mx.example.com MTA
Examine the FortiMail IBE users shown in the exhibit; then answer the question below Which one of the following statements describes the Pre-registered status of the IBE user [email protected]?
A. The user was registered by an administrator in anticipation of IBE participation
B. The user has completed the IBE registration process but has not yet accessed their IBE email
C. The user has received an IBE notification email, but has not accessed the HTTPS URL or attachment yet
D. The user account has been de-activated, and the user must register again the next time they receive an IBE email
Examine the FortiMail IBE service configuration shown in the exhibit; then answer the question below.
Which of the following statements describes the User inactivity expiry time of 90 days?
A. First time IBE users must register to access their email within 90 days of receiving the notification email message
B. After initial registration, IBE users can access the secure portal without authenticating again for 90 days
C. Registered IBE users have 90 days from the time they receive a notification email message to access their IBE email
D. IBE user accounts will expire after 90 days of inactivity, and must register again to access new IBE email message
Examine the exhibit; then answer the question below.
MTA 1 is delivering an email intended for User 1 to MTA 2. Which of the following statements about protocol usage between the devices are true? (Choose two.)
A. MTA 2 will use IMAP to receive the email message from MTA 1
B. MTA 1 will use SMTP to deliver the email message to MTA 2
C. User 1 will use IMAP to download the email message from MTA 2
D. MTA 1 will use POP3 to deliver the email message to User 1 directly
Examine the message column of a log cross search result of an inbound email shown in the exhibit; then answer the question below
Based on logs, which of the following statements are true? (Choose two.)
A. The FortiMail is experiencing issues delivering the email to the back-end mail server
B. The logs were generated by a server mode FortiMail
C. The logs were generated by a gateway or transparent mode FortiMail
D. The FortiMail is experiencing issues accepting the connection from the remote sender
Which of the following statements regarding SMTPS and SMTP over TLS are true? (Choose three.)
A. In an SMTPS session, the identities of both sender and receiver are encrypted
B. SMTPS connections are initiated on port 465
C. SMTP over TLS connections are entirely encrypted and initiated on port 465
D. The STARTTLS command is used to initiate SMTP over TLS
E. SMTPS encrypts the body of the email message, where the most sensitive content exists
Which of the following antispam techniques queries FortiGuard for rating information? (Choose two.)
A. URI filter
B. IP reputation
C. SURBL
D. DNSBL