ExamGecko
Home / Fortinet / NSE6_FML-7.2 / List of questions
Ask Question

Fortinet NSE6_FML-7.2 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

What are two disadvantages of configuring the dictionary and DLP scan rule aggressiveness too high? (Choose two.)

High aggressiveness scan settings do not support executable file types.
High aggressiveness scan settings do not support executable file types.
It is more resource intensive
It is more resource intensive
More false positives could be detected.
More false positives could be detected.
FortiMail requires more disk space for the additional rules.
FortiMail requires more disk space for the additional rules.
Suggested answer: B, C
asked 18/09/2024
Matthew Farrington
35 questions

Question 2

Report Export Collapse

In which FortiMail configuration object can you assign an outbound session profile?

Outbound recipient policy
Outbound recipient policy
Inbound recipient policy
Inbound recipient policy
IP policy
IP policy
Access delivery rule
Access delivery rule
Suggested answer: A
asked 18/09/2024
Timothy Luisterburg
32 questions

Question 3

Report Export Collapse

A FortiMail administrator is investigating a sudden increase in DSNs being delivered to their protected domain. After searching the logs, the administrator identifies that the DSNs were not generated because of any outbound email sent from their organization.

Which FortiMail antispam technique can the administrator use to prevent this scenario?

FortiGuard IP Reputation
FortiGuard IP Reputation
Spoofed header detection
Spoofed header detection
Spam outbreak protection
Spam outbreak protection
Bounce address tag validation
Bounce address tag validation
Suggested answer: D
asked 18/09/2024
Mogens Jensen
33 questions

Question 4

Report Export Collapse

Refer to the exhibit which shows a detailed history log view.

Fortinet NSE6_FML-7.2 image Question 4 26702 09182024190526000000

Which two actions did FortiMail take on this email message? (Choose two.)

FortJMail replaced the virus content with a message
FortJMail replaced the virus content with a message
FortiMail modified the subject of the email message.
FortiMail modified the subject of the email message.
FortiMail forwarded the email to User 1 without scanning.
FortiMail forwarded the email to User 1 without scanning.
FortiMail sent the email message to User 1's personal quarantine.
FortiMail sent the email message to User 1's personal quarantine.
Suggested answer: A, B
asked 18/09/2024
Diogo Vitor
38 questions

Question 5

Report Export Collapse

A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?

Impersonation analysis
Impersonation analysis
Dictionary profile with predefined smart identifiers
Dictionary profile with predefined smart identifiers
Bounce tag verification
Bounce tag verification
Content disarm and reconstruction
Content disarm and reconstruction
Suggested answer: A
asked 18/09/2024
Khaled Fouad
33 questions

Question 6

Report Export Collapse

A FortiMail is configured with the protected domain example.com.

On this FortiMail, which two envelope addresses are considered incoming? (Choose two.)

Suggested answer: A, C
asked 18/09/2024
Adish Narayan
38 questions

Question 7

Report Export Collapse

Refer to the exhibits which show a topology diagram (Topology), and a configuration element (Access Control Rule).

Fortinet NSE6_FML-7.2 image Question 7 26705 09182024190526000000

Fortinet NSE6_FML-7.2 image Question 7 26705 09182024190526000000

An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain.

Which two settings should be used to configure the access receive rule? (Choose two.)

The Sender IP/netmask should be set to 10.29.1.0/24.
The Sender IP/netmask should be set to 10.29.1.0/24.
The Action should be set to Reject
The Action should be set to Reject
The Recipient pattern should be set to * @example. com.
The Recipient pattern should be set to * @example. com.
The Authentication status should be set to Authenticated
The Authentication status should be set to Authenticated
Suggested answer: A, D
asked 18/09/2024
Emily Luijten
46 questions

Question 8

Report Export Collapse

Refer to the exhibit which displays a topology diagram.

Fortinet NSE6_FML-7.2 image Question 8 26706 09182024190526000000

Which two statements describe the built-in bridge functionality on a transparent mode FortiMail? (Choose two.)

If port1. is required to process SMTP traffic, it must be configured as a routed interface.
If port1. is required to process SMTP traffic, it must be configured as a routed interface.
All bridge member interfaces belong to the same subnet as the management IP.
All bridge member interfaces belong to the same subnet as the management IP.
The management IP is permanently tied to port1, and port1 cannot be removed from the bridge.
The management IP is permanently tied to port1, and port1 cannot be removed from the bridge.
Any bridge member interface can be removed from the bridge and configured as a routed interface.
Any bridge member interface can be removed from the bridge and configured as a routed interface.
Suggested answer: B, C
asked 18/09/2024
Wissam Aoun
38 questions

Question 9

Report Export Collapse

Refer to the exhibit which displays the domain configuration of a transparent mode FortiMail device.

Fortinet NSE6_FML-7.2 image Question 9 26707 09182024190526000000

Based on the exhibit, which two sessions are considered incoming sessions? (Choose two.)

DESTINATION IP: 172.16.32.56 MAIL FROM: [email protected] RCPT TO: [email protected]
DESTINATION IP: 172.16.32.56 MAIL FROM: [email protected] RCPT TO: [email protected]
DESTINATION IP: 192.168.54.10 MAIL FROM: [email protected] RCPT TO: [email protected]
DESTINATION IP: 192.168.54.10 MAIL FROM: [email protected] RCPT TO: [email protected]
DESTINATION IP: 10.25.32.15 MAIL FROM: [email protected] RCPT TO: [email protected]
DESTINATION IP: 10.25.32.15 MAIL FROM: [email protected] RCPT TO: [email protected]
DESTINATION IP: 172.16.32.56 MAIL FROM: [email protected] RCPT TO: [email protected]
DESTINATION IP: 172.16.32.56 MAIL FROM: [email protected] RCPT TO: [email protected]
Suggested answer: A, D
asked 18/09/2024
Domenico D'Angelo
40 questions

Question 10

Report Export Collapse

Refer to the exhibit, which shows an inbound recipient policy.

Fortinet NSE6_FML-7.2 image Question 10 26708 09182024190526000000

After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.

What must the administrator do to enforce authentication?

Move this incoming recipient policy to the top of the list.
Move this incoming recipient policy to the top of the list.
Configure a matching IP policy with the exclusive flag enabled.
Configure a matching IP policy with the exclusive flag enabled.
Configure an access delivery rule to enforce authentication.
Configure an access delivery rule to enforce authentication.
Configure an access receive rule to verily authentication status.
Configure an access receive rule to verily authentication status.
Suggested answer: D
asked 18/09/2024
Andy Hodges
39 questions
Total 31 questions
Go to page: of 4
Search

Related questions