Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)
Correct : A, B
Start a Discussions
Which statement about how impersonation analysis identifies spoofed email addresses is correct?
Correct : B
Start a Discussions
Refer to the exhibit which shows an nslookup output of MX records of the example.com domain.
Which two MTA selection behaviors for the example.com domain are correct? (Choose two.)
Correct : B, C
Start a Discussions
While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9:INTERNAL.
Which two statements describe what this policy ID means? (Choose two.)
Correct : A, C
Start a Discussions
Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment.
Which IP address must the DNS MX record for this organization resolve to?
Correct : C
Start a Discussions