Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Fortinet Public Cloud Security FCP_FML_AD-7.4 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam FCP_FML_AD-7.4 Premium Access

View all detail and faqs for the FCP_FML_AD-7.4 exam


335 Students Passed

89% Average Score

90% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibit, which shows a topology diagram of two MTAs.

Question # 1

MTA-1 is delivering an email intended for User 1 to MTA-2. User 1 uses Outlook as an email client. Which two statements about protocol usage between these devices are correct? (Choose two.)

Options:

A.

User 1 will use IMAP or POP3 to download the email message from MTA-2.

B.

MTA-2 will use IMAP to download the email message from MTA-1.

C.

MTA-1 will use SMTP to deliver the email message to MTA-2.

D.

MTA-1 will use POP3 to deliver the email message to User 1 directly.

Questions # 2:

Refer to the exhibit, which shows a partial antispam profile configuration.

Question # 2

What will happen to an email that triggers Spam outbreak protection?

Options:

A.

The email is logged.

B.

The email is rejected.

C.

The email is held in a deferred queue for a period of time.

D.

The email is marked as clean and released to the recipient.

Questions # 3:

Refer to the exhibit, which displays the domain configuration of a FortiMail device running in transparent mode.

Question # 3

Based on the exhibit, which two sessions are considered incoming sessions? (Choose two.)

Options:

A.

DESTINATIONIP:192.163.54.10 MAIL FROM: accour.t3@exaraple.com RCPT TO: saleseexamplc.com

B.

BDESTINATION IP:10.25.32.15 MAIL FROM: trainir.g@example.com RCPT TO: students@external.com

C.

DESTINATIONIP:172.16.32.56 MAIL FROM: misfihosted.net RCPT TO: noc9example.com

D.

DESTINATION IP:172.16.32.56 MAIL FROM: support@example.com RCPT TO: marketingeaxampla.com

Questions # 4:

Refer to the exhibit which shows a topology diagram of a FortiMail cluster deployment.

Question # 4

Which IP address must the DNS MX record for this organization resolve to?

Options:

A.

1172 16 32 57

B.

172.16.32.56

C.

172.16.32.55

D.

172.16.32.1

Questions # 5:

Which statement about how impersonation analysis identifies spoofed email addresses is correct?

Options:

A.

It uses behavior analysis to detect spoofed addresses.

B.

It uses DMARC validation to detect spoofed addresses.

C.

It maps the display name to the correct recipient email address

D.

It uses SPF validation to detect spoofed addresses.

Questions # 6:

Question # 6

Question # 6

Refer to the exhibits, which show a topology diagram (Topology) and a configuration element (IP Policy).

An administrator has enabled the sender reputation feature in the Example_Session profile on FML-1. After a few hours, the deferred queue on the mail server starts filling up with undeliverable email.

Which two changes must theadministrator make to fix this issue? (Choose two.)

Options:

A.

Disable the exclusive flag in IP policy ID 1.

B.

Apply a session profile with sender reputation disabled on a separate IP policy for outbound sessions.

C.

Clear the sender reputation database using the CLI.

D.

Create an outbound recipient policy to bypass outbound email from session profile inspections.

Questions # 7:

Which three configuration steps must you set to enable DKIM signing for outbound messages on FortiMail? (Choose three.}

Options:

A.

Generate a public/private key pair in the protected domain configuration.

B.

Enable the DKIM checker in a matching session profile.

C.

Publish the public key as a TXT record in a public DNS server.

D.

Enable the DKIM checker in a matching antispam profile.

E.

Enable DKIM signing for outgoing messages in a matching session profile.

Questions # 8:

Exhibit.

Question # 8

Refer to the exhibits, which show an email archiving configuration (Email Archiving 1 and Email Archiving 2) from a FortiMail device.

What two archiving actions will FortiMail take when email messages match these archive policies? (Choose two.)

Options:

A.

FortiMail will save archived email in the journal account.

B.

FortiMail will archive email sent from marketingexample. com.

C.

FortiMail will exempt spam email from archiving.

D.

FortiMail will allow only the marketingeexample.com account to access the archived email.

Questions # 9:

Refer to the exhibit, which displays a history log entry.

Question # 9

In the Policy ID column, why isthe last policy ID value SYSTEM?

Options:

A.

The email was dropped by a system blacklist.

B.

The email matched a system-level authentication policy.

C.

It is an inbound email.

D.

The email did not match a recipient-based policy.

Questions # 10:

A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their protected domain. After searching the logs, the administrator identifies that the DSNs werenotgenerated because of any outbound email sent from their organization.

Which FortiMail antispam technique can the administrator use to prevent this scenario?

Options:

A.

FortiGuard IP Reputation

B.

Spoofed header detection

C.

Spam outbreak protection

D.

Bounce address tag validation

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.