Download Fortinet NSE 6 -FortiMail 7-2.NSE6_FML-7.2.VCEplus.2023-08-21.17q.vcex

Vendor: Fortinet
Exam Code: NSE6_FML-7.2
Exam Name: Fortinet NSE 6 -FortiMail 7-2
Date: Aug 21, 2023
File Size: 2 MB
Downloads: 2

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Refer to the exhibits which show a topology diagram (Topology), and a configuration element (Access Control Rule). 
 
 
An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain. 
Which two settings should be used to configure the access receive rule? (Choose two.)
  1. The Sender IP/netmask should be set to 10.29.1.0/24.
  2. The Action should be set to Reject
  3. The Recipient pattern should be set to * @example. com.
  4. The Authentication status should be set to Authenticated
Correct answer: AD
Question 2
Refer to the exhibit which displays a topology diagram. 
 
Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)
  1. If port1. is required to process SMTP traffic, it must be configured as a routed interface.
  2. All bridge member interfaces belong to the same subnet as the management IP.
  3. The management IP is permanently tied to port1, and port1 cannot be removed from the bridge.
  4. Any bridge member interface can be removed from the bridge and configured as a routed interface.
Correct answer: BC
Question 3
Refer to the exhibit which displays the domain configuration of a transparent mode FortiMail device. 
 
Based on the exhibit, which two sessions are considered incoming sessions? (Choose two.)
  1. DESTINATION IP: 172.16.32.56 MAIL FROM: [email protected] RCPT TO: [email protected] 
  2. DESTINATION IP: 192.168.54.10 MAIL FROM: [email protected] RCPT TO: [email protected]
  3. DESTINATION IP: 10.25.32.15 MAIL FROM: [email protected] RCPT TO: [email protected]
  4. DESTINATION IP: 172.16.32.56 MAIL FROM: [email protected] RCPT TO: [email protected]
Correct answer: AD
Question 4
Refer to the exhibit, which shows an inbound recipient policy. 
 
After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP. 
What must the administrator do to enforce authentication?
  1. Move this incoming recipient policy to the top of the list.
  2. Configure a matching IP policy with the exclusive flag enabled.
  3. Configure an access delivery rule to enforce authentication.
  4. Configure an access receive rule to verily authentication status.
Correct answer: D
Question 5
Refer to the exhibits, which display a topology diagram (Topology) and two FortiMail device configurations (FML1 Configuration and FML2 Configuration). 
 
 
 
What is the expected outcome of SMTP sessions sourced from FML1 and destined for FML2?
  1. FML1 will fail to establish any connection with FML2.
  2. FML1 will attempt to establish an SMTPS session with FML2. but fail and revert to standard SMTP.
  3. FML1 will send the STARTTLS command in the SMTP session, which will be rejected by FML2.
  4. FML1 will successfully establish an SMTPS session with FML2.
Correct answer: D
Question 6
Refer to the exhibit which displays a history log entry. 
 
Why does the last field show SYSTEM in the Policy ID column? 
  1. The email was dropped by a system blocklist.
  2. It is an inbound email.
  3. The email matched a system-level authentication policy.
  4. The email did not match a recipient-based policy.
Correct answer: D
Question 7
Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)
  1. IP reputation
  2. Spam outbreak protection
  3. DNSBL
  4. Behavior analysis
Correct answer: AB
Question 8
Refer to the exhibit which shows an nslookup output of MX records of the example.com domain. 
 
Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)
  1. mx.example.com will receive approximately twice the number of email as mx.hosted.com because of its preference value.
  2. The primary MTA for the example.com domain is mx.hosted.com.
  3. The external MTAs will send email to mx.example.com only if mx.hosted.com is unreachable.
  4. The PriNS server should receive all email for the example.com domain.
Correct answer: BC
Question 9
While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9:INTERNAL.
Which two statements describe what this policy ID means? (Choose two.)
  1. Access control policy number 9 was used.
  2. The FortiMail configuration is missing an access delivery rule.
  3. The email was processed using IP-based policy ID 4.
  4. FortiMail is applying the default behavior for relaying inbound email. 
Correct answer: AC
Question 10
Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment. 
 
Which IP address must the DNS MX record for this organization resolve to?
  1. 1172 16 32 57
  2. 172.16.32.56
  3. 172.16.32.55
  4. 172.16.32.1
Correct answer: C
Question 11
Refer to the exhibits which show a topology diagram (Topology), and a configuration element (Access Control Rule). 
 
 
An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain. 
Which two settings should be used to configure the access receive rule? (Choose two.)
  1. The Sender IP/netmask should be set to 10.29.1.0/24.
  2. The Action should be set to Reject
  3. The Recipient pattern should be set to * @example. com.
  4. The Authentication status should be set to Authenticated
Correct answer: AD
Question 12
Refer to the exhibit which displays a topology diagram. 
 
Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)
  1. If port1. is required to process SMTP traffic, it must be configured as a routed interface.
  2. All bridge member interfaces belong to the same subnet as the management IP.
  3. The management IP is permanently tied to port1, and port1 cannot be removed from the bridge.
  4. Any bridge member interface can be removed from the bridge and configured as a routed interface.
Correct answer: BC
Question 13
Refer to the exhibit which displays the domain configuration of a transparent mode FortiMail device. 
 
Based on the exhibit, which two sessions are considered incoming sessions? (Choose two.)
  1. DESTINATION IP: 172.16.32.56 MAIL FROM: [email protected] RCPT TO: [email protected] 
  2. DESTINATION IP: 192.168.54.10 MAIL FROM: [email protected] RCPT TO: [email protected]
  3. DESTINATION IP: 10.25.32.15 MAIL FROM: [email protected] RCPT TO: [email protected]
  4. DESTINATION IP: 172.16.32.56 MAIL FROM: [email protected] RCPT TO: [email protected]
Correct answer: AD
Question 14
Refer to the exhibit, which shows an inbound recipient policy. 
 
After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP. 
What must the administrator do to enforce authentication?
  1. Move this incoming recipient policy to the top of the list.
  2. Configure a matching IP policy with the exclusive flag enabled.
  3. Configure an access delivery rule to enforce authentication.
  4. Configure an access receive rule to verily authentication status.
Correct answer: D
Question 15
Refer to the exhibits, which display a topology diagram (Topology) and two FortiMail device configurations (FML1 Configuration and FML2 Configuration). 
 
 
 
What is the expected outcome of SMTP sessions sourced from FML1 and destined for FML2?
  1. FML1 will fail to establish any connection with FML2.
  2. FML1 will attempt to establish an SMTPS session with FML2. but fail and revert to standard SMTP.
  3. FML1 will send the STARTTLS command in the SMTP session, which will be rejected by FML2.
  4. FML1 will successfully establish an SMTPS session with FML2.
Correct answer: D
Question 16
Refer to the exhibit which displays a history log entry. 
 
Why does the last field show SYSTEM in the Policy ID column? 
  1. The email was dropped by a system blocklist.
  2. It is an inbound email.
  3. The email matched a system-level authentication policy.
  4. The email did not match a recipient-based policy.
Correct answer: D
Question 17
Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)
  1. IP reputation
  2. Spam outbreak protection
  3. DNSBL
  4. Behavior analysis
Correct answer: AB
Question 18
Refer to the exhibit which shows an nslookup output of MX records of the example.com domain. 
 
Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)
  1. mx.example.com will receive approximately twice the number of email as mx.hosted.com because of its preference value.
  2. The primary MTA for the example.com domain is mx.hosted.com.
  3. The external MTAs will send email to mx.example.com only if mx.hosted.com is unreachable.
  4. The PriNS server should receive all email for the example.com domain.
Correct answer: BC
Question 19
While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9:INTERNAL.
Which two statements describe what this policy ID means? (Choose two.)
  1. Access control policy number 9 was used.
  2. The FortiMail configuration is missing an access delivery rule.
  3. The email was processed using IP-based policy ID 4.
  4. FortiMail is applying the default behavior for relaying inbound email. 
Correct answer: AC
Question 20
Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment. 
 
Which IP address must the DNS MX record for this organization resolve to?
  1. 1172 16 32 57
  2. 172.16.32.56
  3. 172.16.32.55
  4. 172.16.32.1
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!