Certbus > Fortinet > NSE 6 Network Security Specialist > NSE6_FML-6.2 > NSE6_FML-6.2 Online Practice Questions and Answers

NSE6_FML-6.2 Online Practice Questions and Answers

Questions 4

Refer to the exhibit.

MTA-1 is delivering an email intended for User 1 to MTA-2.

Which two statements about protocol usage between the devices are true? (Choose two.)

A. User 1 will use IMAP to download the email message from MTA-2

B. MTA-2 will use IMAP to receive the email message from MTA-1

C. MTA-1 will use POP3 to deliver the email message to User 1 directly

D. MTA-1 will use SMTP to deliver the email message to MTA-2

Browse 30 Q&As
Questions 5

An administrator sees that an excessive amount of storage space on a FortiMail device is being used up by quarantine accounts for invalid users. The FortiMail is operating in transparent mode.

Which two FortiMail features can the administrator configure to tackle this issue? (Choose two.)

A. Automatic removal of quarantine accounts

B. Recipient address verification

C. Bounce address tag verification

D. Sender address rate control

Browse 30 Q&As
Questions 6

What three configuration steps are required to enable DKIM signing for outbound messages on FortiMail? (Choose three.)

A. Generate a public/private key pair in the protected domain configuration

B. Enable DKIM check in a matching session profile

C. Enable DKIM check in a matching antispam profile

D. Publish the public key as a TXT record in a public DNS server

E. Enable DKIM signing for outgoing messages in a matching session profile

Browse 30 Q&As
Questions 7

Which three statements about SMTPS and SMTP over TLS are true? (Choose three.)

A. SMTP over TLS connections are entirely encrypted and initiated on port 465

B. SMTPS encrypts the identities of both the sender and receiver

C. The STARTTLS command is used to initiate SMTP over TLS

D. SMTPS encrypts only the body of the email message

E. SMTPS connections are initiated on port 465

Browse 30 Q&As
Questions 8

Refer to the exhibit.

Which two statements about the access receive rule are true? (Choose two.)

A. Email matching this rule will be relayed

B. Email must originate from an example.com email address to match this rule

C. Senders must be authenticated to match this rule

D. Email from any host in the 10.0.1.0/24 subnet can match this rule

Browse 30 Q&As
Questions 9

Which firmware upgrade method for an active-passive HA cluster ensures service outage is minimal, and there are no unnecessary failovers?

A. Break the cluster, upgrade the units independently, and then form the cluster

B. Upgrade both units at the same time

C. Upgrade the standby unit, and then upgrade the active unit

D. Upgrade the active unit, which will upgrade the standby unit automatically

Browse 30 Q&As
Questions 10

A FortiMail is configured with the protected domain example.com.

On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)

A. MAIL FROM: [email protected] RCPT TO: [email protected]

B. MAIL FROM: [email protected] RCPT TO: [email protected]

C. MAIL FROM: [email protected] RCPT TO: [email protected]

D. MAIL FROM: [email protected] RCPT TO: [email protected]

Browse 30 Q&As
Questions 11

Refer to the exhibit.

Which statement describes the impact of setting the User inactivity expiry time option to 90 days?

A. IBE user accounts will expire after 90 days of inactivity, and must register again to access new IBE email message

B. Registered IBE users have 90 days from the time they receive a notification email message to access their IBE email

C. After initial registration, IBE users can access the secure portal without authenticating again for 90 days

D. First time IBE users must register to access their email within 90 days of receiving the notification email message

Browse 30 Q&As
Questions 12

Refer to the exhibit.

Which message size limit will FortiMail apply to the outbound email?

A. 204800

B. 1024

C. 51200

D. 10240

Browse 30 Q&As
Questions 13

A FortiMail administrator is investigating a sudden increase in DSNs being delivered to the protected domain for undeliverable email messages. After searching the logs, the administrator identifies that the DSNs were not generated as a result of any outbound email sent from the protected domain.

Which FortiMail antispam technique can the administrator use to prevent this scenario?

A. Spam outbreak protection

B. Bounce address tag validation

C. Spoofed header detection

D. FortiGuard IP Reputation

Browse 30 Q&As
Questions 14

While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs

0:4:9.

Which two scenarios will generate this policy ID? (Choose two.)

A. Email was processed using IP policy ID 4

B. Incoming recipient policy ID 9 has the exclusive flag set

C. FortiMail applies the default behavior for relaying inbound email

D. FortiMail configuration is missing an access delivery rule

Browse 30 Q&As
Questions 15

Refer to the exhibit.

The exhibit shows a FortiMail active-passive setup.

Which three actions are recommended when configuring the primary FortiMail HA interface? (Choose three.)

A. Disable Enable port monitor

B. In the Heartbeat status drop-down list, select Primary

C. In the Peer IP address field, type 172.16.32.57

D. In the Virtual IP action drop-down list, select Use

E. In the Virtual IP address field, type 172.16.32.55/24

Browse 30 Q&As
Questions 16

Which FortiMail option removes embedded code components in Microsoft Word, while maintaining the original file format?

A. Behavior analysis

B. Impersonation analysis

C. Content disarm and reconstruction

D. Header analysis

Browse 30 Q&As
Questions 17

While testing outbound MTA functionality, an administrator discovers that all outbound email is being processed using policy IDs 1:2:0.

Which two reasons explain why the last policy ID value is 0? (Choose two.)

A. Outbound email is being rejected

B. IP policy ID 2 has the exclusive flag set

C. There are no outgoing recipient policies configured

D. There are no access delivery rules configured for outbound email

Browse 30 Q&As
Questions 18

An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas.

Which FortiMail feature specific to server mode can be used to accomplish this?

A. Resource profiles

B. Domain-level service settings

C. Access profiles

D. Address book management options

Browse 30 Q&As
Exam Code: NSE6_FML-6.2
Exam Name: Fortinet NSE 6 - FortiMail 6.2
Last Update: Apr 29, 2024
Questions: 30 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99