Examine the FortiMail antivirus action profile shown in the exhibit; then answer the question below.
What is the expected outcome if FortiMail applies this action profile to an email? (Choose two.)
Refer to the exhibit.
Which two statements about the access receive rule are true? (Choose two.)
Refer to the exhibit.
What two archiving actions will FortiMail take when email messages match these archive policies? (Choose two.)
Refer to the exhibit.
For the transparent mode FortiMail shown in the exhibit, which two sessions are considered incoming sessions? (Choose two.)
What are the configuration steps to enable DKIM signing for outbound messages on FortiMail? (Choose three.)
Examine the FortiMail topology and IP-based policy shown in the exhibit; then answer the question below.
An administrator has enabled the sender reputation feature in the Example_Session profile on FML-1. After a few hours, the deferred queue on the Mail Server started filing up with undeliverable email. What changes should the administrator make to fix this issue? (Choose two.)
Examine the nslookup output shown in the exhibit; then answer the question below.
Identify which of the following statements is true regarding the example.com domain’s MTAs. (Choose two.)
Examine the configured routes shown in the exhibit; then answer the question below.
Which interface will FortiMail use to forward an email message destined for 10.1.100.252?
Refer to the exhibit.
Which two message types will trigger this DLP scan rule? (Choose two.)
Refer to the exhibit.
Which two statements about the mail server settings are true? (Choose two.)
Which statement about how impersonation analysis identifies spoofed email addresses is correct?
Refer to the exhibit.
What are two expected outcomes if FortiMail applies this antivirus action profile to an email? (Choose two.)
Which two CLI commands, if executed, will erase all data on the log disk partition? (Choose two.)