Pass the Fortinet NSE 6 Network Security Specialist NSE6_FML-7.2 Questions and answers with CertsForce

Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibits which show a topology diagram (Topology), and a configuration element (Access Control Rule).

Question # 1

Question # 1

An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain.

Which two settings should be used to configure the access receive rule? (Choose two.)

Options:

A.

The Sender IP/netmask should be set to 10.29.1.0/24.


B.

The Action should be set to Reject


C.

The Recipient pattern should be set to • @example. com.


D.

The Authentication status should be set to Authenticated


Expert Solution
Questions # 2:

Refer to the exhibits which shows a DLP scan profile configuration (DLP Scan Rule 1 and DLP Scan Rule 2) from a FortiMail device.

Question # 2

Question # 2

Which two message types will trigger this DLP scan rule? (Choose two.)

Options:

A.

An email that contains credit card numbers in the body, attachment, and subject will trigger this scan rule.


B.

An email sent from salesdinternal. lab will trigger this scan rule, even without matching any conditions.


C.

An email message with a subject that contains the term "credit card' will trigger this scan rule.


D.

An email message that contains credit card numbers in the body will trigger this scan rule.


Expert Solution
Questions # 3:

A FortiMail device is configured with the protected domain example.com.

If none of the senders is authenticated, which two envelope addresses will require an access receive rule? (Choose two.)

Options:

A.

MAIL FROM: support@example.org RCPT TO: marketing@example.com


B.

MAIL FROM: mis@hosted.net RCPT TO: noc@example.com


C.

MAIL FROM: accounts@example.com RCPT TO: sales@biz.example.com


D.

MAIL FROM: training@example.com RCPT TO: students@external.org


Expert Solution
Questions # 4:

Refer to the exhibit which shows a command prompt output of a telnet command.

Question # 4

Which configuration change must you make to prevent the banner from displaying the FortiMail serial number?

Options:

A.

Change the host name


B.

Add a protected domain


C.

Configure a local domain name


D.

Change the operation mode


Expert Solution
Questions # 5:

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?

Options:

A.

Impersonation analysis


B.

Dictionary profile with predefined smart identifiers


C.

Bounce tag verification


D.

Content disarm and reconstruction


Expert Solution
Questions # 6:

Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)

Options:

A.

IP reputation


B.

Spam outbreak protection


C.

DNSBL


D.

Behavior analysis


Expert Solution
Questions # 7:

Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)

Options:

A.

Policy configuration changes of all cluster members from the primary device.


B.

Mail statistics of all cluster members on the primary device.


C.

Cross-device log searches across all cluster members from the primary device.


D.

Firmware update of all cluster members from the primary device


Expert Solution
Questions # 8:

Refer to the exhibits, which display a topology diagram (Topology) and two FortiMail device configurations (FML1 Configuration and FML2 Configuration).

Question # 8

Question # 8

Question # 8

What is the expected outcome of SMTP sessions sourced from FML1 and destined for FML2?

Options:

A.

FML1 will fail to establish any connection with FML2.


B.

FML1 will attempt to establish an SMTPS session with FML2. but fail and revert to standard SMTP.


C.

FML1 will send the STARTTLS command in the SMTP session, which will be rejected by FML2.


D.

FML1 will successfully establish an SMTPS session with FML2.


Expert Solution
Questions # 9:

Refer to the exhibit, which shows a few lines of FortiMail logs.

Question # 9

Based on these log entries, which two statements correctly describe the operational status of this FortiMail device? (Choose two.)

Options:

A.

FortJMail is experiencing issues delivering the email to the internal.lab MTA.


B.

The FortiMail device is in sever mode.


C.

The FortiMail device is in gateway or transparent mode.


D.

FortiMail is experiencing issues accepting the connection from the external. lab MTA.


Expert Solution
Viewing page 1 out of 1 pages
Viewing questions 1-10 out of questions