Refer to the exhibits, which display a topology diagram (Topology) and two FortiMail device configurations (FML1 Configuration and FML2 Configuration).
What is the expected outcome of SMTP sessions sourced from FML1 and destined for FML2?
Refer to the exhibit, which shows a few lines of FortiMail logs.
Based on these log entries, which two statements correctly describe the operational status of this FortiMail device? (Choose two.)
Refer to the exhibit which displays a topology diagram.
Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)
Refer to the exhibits showing SMTP limits (Session Profile — SMTP Limits), and domain settings (Domain Settings, and Domain Settings — Other) of a FortiMail device.
Which message size limit in KB will the FortiMail apply to outbound email?
A FortiMail is configured with the protected domain example.com.
On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)
In which two places can the maximum email size be overridden on FortiMail? (Choose two.)
Refer to the exhibit which shows the output of an email transmission using a telnet session.
What are two correct observations about this SMTP session? (Choose two.)
Refer to the exhibits which show a topology diagram (Topology) and a configuration element (Access Control Rule).
Which three access control settings are recommended to allow outbound email from the example.com domain on FML-1? (Choose three.)
Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Fortinet Free Exams |
---|
![]() |