Examine the FortiMail recipient-based policy shown in the exhibit; then answer the question below.
After creating the policy, an administrator discovered that clients are able to send unauthenticated email using SMTP. What must be done to ensure clients cannot send unauthenticated email?
A. Configure a matching IP policy with SMTP authentication and exclusive flag enabled
B. Move the recipient policy to the top of the list
C. Configure an access receive rule to verify authentication status
D. Configure an access delivery rule to enforce authentication
Examine the FortMail mail server settings shown in the exhibit; then answer the question below.
Which of the following statements are true? (Choose two.)
A. mx.example.com will enforce SMTPS on all outbound sessions
B. mx.example.com will display STARTTLS as one of the supported commands in SMTP sessions
C. mx.example.com will accept SMTPS connections
D. mx.example.com will drop any inbound plaintext SMTP connection
Examine the FortiMail IBE users shown in the exhibit; then answer the question below Which one of the following statements describes the Pre-registered status of the IBE user [email protected]?
A. The user was registered by an administrator in anticipation of IBE participation
B. The user has completed the IBE registration process but has not yet accessed their IBE email
C. The user has received an IBE notification email, but has not accessed the HTTPS URL or attachment yet
D. The user account has been de-activated, and the user must register again the next time they receive an IBE email
Examine the FortiMail user webmail interface shown in the exhibit; then answer the question below.
Which one of the following statements is true regarding this server mode FortiMail's configuration?
A. The protected domain-level service settings have been modified to allow access to the domain address book
B. This user's account has a customized access profile applied that allows access to the personal address book
C. The administrator has not made any changes to the default address book access privileges
D. The administrator has configured an inbound recipient policy with a customized resource profile
Examine the exhibit; then answer the question below.
MTA 1 is delivering an email intended for User 1 to MTA 2. Which of the following statements about protocol usage between the devices are true? (Choose two.)
A. MTA 2 will use IMAP to receive the email message from MTA 1
B. MTA 1 will use SMTP to deliver the email message to MTA 2
C. User 1 will use IMAP to download the email message from MTA 2
D. MTA 1 will use POP3 to deliver the email message to User 1 directly
Examine the message column of a log cross search result of an inbound email shown in the exhibit; then answer the question below
Based on logs, which of the following statements are true? (Choose two.)
A. The FortiMail is experiencing issues delivering the email to the back-end mail server
B. The logs were generated by a server mode FortiMail
C. The logs were generated by a gateway or transparent mode FortiMail
D. The FortiMail is experiencing issues accepting the connection from the remote sender
Examine the FortiMail archiving policies shown in the exhibit; then answer the question below.
Which of the following statements is true regarding this configuration? (Choose two.)
A. Spam email will be exempt from archiving
B. Email sent from [email protected] will be archived
C. Archived email will be saved in the journal account
D. Only the [email protected] account will be able to access the archived email
Which of the following statements regarding SMTPS and SMTP over TLS are true? (Choose three.)
A. In an SMTPS session, the identities of both sender and receiver are encrypted
B. SMTPS connections are initiated on port 465
C. SMTP over TLS connections are entirely encrypted and initiated on port 465
D. The STARTTLS command is used to initiate SMTP over TLS
E. SMTPS encrypts the body of the email message, where the most sensitive content exists
Which firmware upgrade method for an active-passive HA cluster ensures service outage is minimal and there are no unnecessary failovers?
A. Upgrade the active unit, which will upgrade the standby unit automatically
B. Upgrade both units at the same time
C. Upgrade the standby unit, and then upgrade the active unit
D. Break the cluster, upgrade the units independently, and then form the cluster again as quickly as possible
Examine the FortiMail topology and IP-based policy shown in the exhibit; then answer the question below.
An administrator has enabled the sender reputation feature in the Example_Session profile on FML-1. After a few hours, the deferred queue on the Mail Server started filing up with undeliverable email. What changes should the administrator make to fix this issue? (Choose two.)
A. Clear the sender reputation database using the CLI
B. Create an outbound recipient policy to bypass outbound email from session profile inspections
C. Disable the exclusive flag in IP policy ID 1
D. Apply a session profile with sender reputation disabled on a separate IP policy for outbound sessions