Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)
When configuring a FortiMail HA group consisting of different models, which two statements are true? (Choose two.)
What are two disadvantages of configuring the dictionary and DLP scan rule aggressiveness too high? (Choose two.)
Refer to the exhibit which shows a detailed history log view.
Which two actions did FortiMail take on this email message? (Choose two.)
Refer to the exhibit, which shows an inbound recipient policy.
After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.
What must the administrator do to enforce authentication?
Which two antispam techniques query FortiGuard for rating information? (Choose two.)
Exhibit.
Refer to the exhibits, which show an email archiving configuration (Email Archiving 1 and Email Archiving 2) from a FortiMail device.
What two archiving actions will FortiMail take when email messages match these archive policies? (Choose two.)
Refer to the exhibit which shows annslookupoutput of MX records of theexample.comdomain.
Which two MTA selection behaviors for theexample.comdomain are correct? (Choose two.)
Refer to the exhibit which displays a topology diagram.
Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)
Which license must you apply to a FortiMail device to enable the HA centralized monitoring features?