New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Fortinet NSE6_FML-7.2 Fortinet NSE 6 - FortiMail 7.2 Exam Practice Test

Fortinet NSE 6 - FortiMail 7.2 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which item is a supported one-time secure token for IBE authentication?

Options:

A.

FortiToken

B.

Certificate

C.

SMS

D.

Security question

Question 2

Refer to the exhibit, which shows a topology diagram of two separate email domains.

Which two statements correctly describe how an email message is delivered from User A to User B? (Choose two.)

Options:

A.

mx.example1.org will forward the email message to the MX record that has the lowest preference.

B.

User B will retrieve the email message using either POP3 or IMAP.

C.

User A’s MUA will perform a DNS MX record lookup to send the email message.

D.

The DNS server will act as an intermediary MTA.

Question 3

Refer to the exhibit which displays a list of IBE users on a FortiMail device.

Which statement describes the pre-registered status of the IBE user extuser2@external.lab?

Options:

A.

The user has received an IBE notification email, but has not accessed the HTTPS URL or attachment yet.

B.

The user was registered by an administrator in anticipation of IBE participation.

C.

The user account has been de-activated, and the user must register again the next time they receive an IBE email.

D.

The user has completed the IBE registration process, but has not yet accessed their IBE email.

Question 4

Refer to the exhibit which shows an nslookup output of MX records of the example.com domain.

Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)

Options:

A.

mx.example.com will receive approximately twice the number of email as mx.hosted.com because of its preference value.

B.

The primary MTA for the example.com domain is mx.hosted.com.

C.

The external MTAs will send email to mx.example.com only if mx.hosted.com is unreachable.

D.

The PriNS server should receive all email for the example.com domain.

Question 5

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?

Options:

A.

Impersonation analysis

B.

Dictionary profile with predefined smart identifiers

C.

Bounce tag verification

D.

Content disarm and reconstruction

Question 6

In which FortiMail configuration object can you assign an outbound session profile?

Options:

A.

Outbound recipient policy

B.

Inbound recipient policy

C.

IP policy

D.

Access delivery rule

Question 7

Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)

Options:

A.

Policy configuration changes of all cluster members from the primary device.

B.

Mail statistics of all cluster members on the primary device.

C.

Cross-device log searches across all cluster members from the primary device.

D.

Firmware update of all cluster members from the primary device

Question 8

A FortiMail device is configured with the protected domain example.com.

If none of the senders is authenticated, which two envelope addresses will require an access receive rule? (Choose two.)

Options:

A.

MAIL FROM: support@example.org RCPT TO: marketing@example.com

B.

MAIL FROM: mis@hosted.net RCPT TO: noc@example.com

C.

MAIL FROM: accounts@example.com RCPT TO: sales@biz.example.com

D.

MAIL FROM: training@example.com RCPT TO: students@external.org

Question 9

Refer to the exhibits which shows a DLP scan profile configuration (DLP Scan Rule 1 and DLP Scan Rule 2) from a FortiMail device.

Which two message types will trigger this DLP scan rule? (Choose two.)

Options:

A.

An email that contains credit card numbers in the body, attachment, and subject will trigger this scan rule.

B.

An email sent from salesdinternal. lab will trigger this scan rule, even without matching any conditions.

C.

An email message with a subject that contains the term "credit card' will trigger this scan rule.

D.

An email message that contains credit card numbers in the body will trigger this scan rule.