NSE6_FML exam.14q

Similar documents
Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional

Test-king q

Vendor: Cisco. Exam Code: Exam Name: ESFE Cisco Security Field Engineer Specialist. Version: Demo

Technical Note. FortiMail Best Practices Version 3.0 MR4.

Symantec ST Symantec Messaging Gateway Download Full Version :

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

ESFE Cisco Security Field Engineer Specialist

Symantec ST0-250 Exam

Security by Any Other Name:

FortiMail Gateway Setup and Configuration Technical Note

Mail Assure Quick Start Guide

Understanding the Pipeline

Setting up Microsoft Office 365

Using Centralized Security Reporting

Mail Assure. Quick Start Guide

Lotus Protector Interop Guide. Mail Encryption Mail Security Version 1.4

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0

Dell SonicWALL Security 8.2. Administration Guide

Filtering 7 April 2014

Webmail Which Webmail applications are available?

Cisco Encryption

SMTP Extension for Alternate Recipient Delivery Option (draft-melnikov-smtp-altrecip-on-error-00.txt)

Mail Assure. User Guide - Admin, Domain and Level

How to Configure Esva for Office365

ACCURATE STUDY GUIDES, HIGH PASSING RATE! Question & Answer. Dump Step. provides update free of charge in one year!

Anti-Spoofing. Inbound SPF Settings

FortiMail. FortiMail 60D, 200E, 400E, 1000D, 2000E, 3000E, 3200E and VM

Version SurfControl RiskFilter - Administrator's Guide

FortiMail. Threat Prevention. Data Protection. Security Fabric Integration. FortiMail 60D, 200E, 400E, 1000D, 2000E, 3000E, 3200E and VM

Exam : ST Title : Symantec Mail Security 8300 Series (STS) Version : Demo

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Zimbra Network Edition Professional

Office 365 Standalone Security

MDaemon Vs. Kerio Connect

MDaemon Vs. Microsoft Exchange Server 2016 Standard

anti-spam techniques beyond Bayesian filters

Comodo Dome Antispam Software Version 6.0

MDaemon Vs. IceWarp Unified Communications Server

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide

Configuring SIP Registration Proxy on Cisco UBE

MDaemon Vs. MailEnable Enterprise Premium

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. MailEnable Enterprise Premium

FortiMail Secure Messaging Platform

Configuring SMTP Routing

Microsoft PRO- Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

Sophos Appliance Configuration Guide. Product Version 4.3 Sophos Limited 2017

MDaemon Vs. Kerio Connect

WeCloud Security. Administrator's Guide

SolarWinds Mail Assure

MDaemon Vs. SmarterMail Enterprise Edition

Anti-Spam. Overview of Anti-Spam Scanning

MDaemon Vs. SmarterMail Enterprise Edition

Appliance Installation Guide

Comprehensive Setup Guide for TLS on ESA

AccessEnforcer Version 4.0 Features List

IBM SmartCloud Notes (SCN) Mail Routing

MDaemon Vs. SmarterMail Enterprise Edition

FortiMail Release Notes VERSION GA

Anti-Spam. Overview of Anti-Spam Scanning

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

Tracking Messages

Error Codes have 3 Digits

Comodo Dome Antispam Software Version 6.0

Symantec Security. Setup and Configuration Guide

es T tpassport Q&A * K I J G T 3 W C N K V [ $ G V V G T 5 G T X K E G =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX *VVR YYY VGUVRCUURQTV EQO

To create a few test accounts during the evaluation period, use the Manually Add Users steps.

WorldSecure/Mail Getting Started Guide

Interdomain Federation Guide for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2

Internet Architecture

Mobile MOUSe EXCHANGE SERVER 2010 CONFIGURATION ONLINE COURSE OUTLINE

FortiMail Release Notes VERSION GA

Content Filters. Overview of Content Filters. How Content Filters Work. This chapter contains the following sections:

Instructions Eudora OSE Page 1

CISCO EXAM QUESTIONS & ANSWERS

provides several new features and enhancements, and resolves several issues reported by WatchGuard customers.

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections:

Cisco Passguide Exam Questions & Answers

CCNA 1 Chapter 10 v5.0 Exam Answers 2013

Cisco EXAM ESFE Cisco Security Field Engineer Specialist.

TrendMicro Hosted Security. Best Practice Guide

Step 2 - Deploy Advanced Security for Exchange Server

Power Tools. Mimecast Training. Student Workbook. V 1.2

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro

University of Chicago Medical Center. Secure Gateway. Procedure. CBIS Information Security Office

Ciphermail Webmail Messenger Administration Guide

Table of Contents Control Panel Access... 1 Incoming... 6 Outgoing Archive Protection Report Whitelist / Blacklist...

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

History Page. Barracuda NextGen Firewall F

SonicWALL Security 6.0 Software

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Comendo mail- & spamfence

Schema for Gmail logs in BigQuery

Defining Which Hosts Are Allowed to Connect Using the Host Access Table

How to Configure Office 365 for Inbound and Outbound Mail

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION

examcollection.premium.exam.161q

Defining Which Hosts Are Allowed to Connect Using the Host Access Table

Configuring Gmail (G Suite) with Cisco Cloud Security

Transcription:

NSE6_FML-5.3.8.exam.14q Number: NSE6_FML-5.3.8 Passing Score: 800 Time Limit: 120 min NSE6_FML-5.3.8 FortiMail 5.3.8 Specialist

Exam A QUESTION 1 Examine the nslookup output shown in the exhibit; then answer the question below. Identify which of the following statements is true regarding the example.com domain s MTAs. (Choose two.) A. External MTAs will send email to mx.example.com only if mx.hosted.com is unreachable B. The primary MTA for the example.com domain is mx.hosted.com C. The PriNS server should receive all email for the example.com domain D. The higher preference value is used to load balance more email to the mx.example.com MTA Correct Answer: CD QUESTION 2 What are the configuration steps to enable DKIM signing for outbound messages on FortiMail? (Choose three.) A. Enable DKIM signing for outgoing messages in a matching session profile

B. Publish the public key as a TXT record in a public DNS server C. Enable DKIM check in a matching session profile D. Enable DKIM check in a matching antispam profile E. Generate a public/private key pair in the protected domain configuration Correct Answer: ACE QUESTION 3 Examine the FortiMail active-passive cluster shown in the exhibit; then answer the question below.

Which of the following parameters are recommended for the Primary FortiMail s HA interface configuration? (Choose three.) A. Enable port monitor: disable B. Peer IP address: 172.16.32.57 C. Heartbeat status: Primary D. Virtual IP address: 172.16.32.55/24 E. Virtual IP action: Use Correct Answer: CDE

QUESTION 4 Which of the following statements are true regarding FortiMail s behavior when using the built-in MTA to process email in transparent mode? (Choose two.) A. FortiMail can queue undeliverable messages and generate DSNs B. If you disable the built-in MTA, FortiMail will use its transparent proxies to deliver email C. FortiMail ignores the destination set by the sender and uses its own MX record lookup to deliver email D. MUAs need to be configured to connect to the built-in MTA to send email Correct Answer: BC QUESTION 5 What IP address should the DNS MX record for this deployment resolve to? A. 172.16.32.1

B. 172.16.32.57 C. 172.16.32.55 D. 172.16.32.56 Correct Answer: C QUESTION 6 Examine the FortiMail topology and access receive rule shown in the exhibit; then answer the question below.

An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain. Which of the following settings should be used to configure the access receive rule? (Choose two.) A. The Sender IP/netmask should be set to 10.29.1.0/24 B. The Authentication status should be set to Authenticated C. The Recipient pattern should be set o *@example.com D. The Action should be set to Reject Correct Answer: CD

QUESTION 7 Examine the configured routes shown in the exhibit; then answer the question below. Which interface will FortiMail use to forward an email message destined for 10.1.100.252? A. port2 B. port4 C. port3 D. port1 Correct Answer: A QUESTION 8 Examine the FortiMail IBE service configuration shown in the exhibit; then answer the question below.

Which of the following statements describes the User inactivity expiry time of 90 days? A. First time IBE users must register to access their email within 90 days of receiving the notification email message B. After initial registration, IBE users can access the secure portal without authenticating again for 90 days C. Registered IBE users have 90 days from the time they receive a notification email message to access their IBE email D. IBE user accounts will expire after 90 days of inactivity, and must register again to access new IBE email message Correct Answer: D QUESTION 9 Examine the FortiMail user webmail interface shown in the exhibit; then answer the question below.

Which one of the following statements is true regarding this server mode FortiMail s configuration? A. The protected domain-level service settings have been modified to allow access to the domain address book B. This user s account has a customized access profile applied that allows access to the personal address book C. The administrator has not made any changes to the default address book access privileges D. The administrator has configured an inbound recipient policy with a customized resource profile Correct Answer: A QUESTION 10 Examine the FortiMail DLP scan rule shown in the exhibit; then answer the question below.

Which of the following statements is true regarding this configuration? (Choose two.) A. An email message containing the words Credit Card in the subject will trigger this scan rule B. If an email is sent from sales@internal.lab the action will be applied without matching any conditions C. An email message containing credit card numbers in the body will trigger this scan rule D. An email must contain credit card numbers in the body, attachment, and subject to trigger this scan rule Correct Answer: AC QUESTION 11

Which of the following statements are true regarding the transparent mode FortiMail s email routing for the example.com domain? (Choose two.) A. FML-1 will use the built-in MTA for outgoing sessions B. FML-1 will use the transparent proxy for incoming sessions C. If incoming email are undeliverable, FML-1 can queue them to retry again later D. If outgoing email messages are undeliverable, FML-1 can queue them to retry later Correct Answer: BC

QUESTION 12 Examine the FortiMail archiving policies shown in the exhibit; then answer the question below. Which of the following statements is true regarding this configuration? (Choose two.)

A. Spam email will be exempt from archiving B. Email sent from marketing@example.com will be archived C. Archived email will be saved in the journal account D. Only the marketing@example.com account will be able to access the archived email Correct Answer: AB QUESTION 13 A FortiMail is configured with the protected domain example.com. For this FortiMail, which of the following envelope addresses are considered incoming? (Choose two.) A. MAIL FROM: training@external.org RCPT TO: students@external.org B. MAIL FROM: support@example.com PCPT TO: marketing@example.com C. MAIL FROM: mis@hosted.net RCPT TO: noc@example.com D. MAIL FROM: accounts@example.com RCPT TO: sales@external.org Correct Answer: BD QUESTION 14 Which of the following statements regarding SMTPS and SMTP over TLS are true? (Choose three.) A. In an SMTPS session, the identities of both sender and receiver are encrypted B. SMTPS connections are initiated on port 465 C. SMTP over TLS connections are entirely encrypted and initiated on port 465 D. The STARTTLS command is used to initiate SMTP over TLS E. SMTPS encrypts the body of the email message, where the most sensitive content exists Correct Answer: ABD