Refer to the exhibit, which shows a topology diagram of two separate email domains.
Which two statements correctly describe how an email message is delivered from User A to User B? (Choose two.)
Refer to the exhibit which displays a history log entry.
Why does the last field show SYSTEM in the Policy ID column?
An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas.
Which FortiMail feature specific to server mode can be used to accomplish this?
Which two features are available when you enable HA centralized monitoring on FortiMail? (Choose two.)
Refer to the exhibits which shows a DLP scan profile configuration (DLP Scan Rule 1 and DLP Scan Rule 2) from a FortiMail device.
Which two message types will trigger this DLP scan rule? (Choose two.)
Refer to the exhibit, which shows an inbound recipient policy.
After creating the policy shown in the exhibit, an administrator discovers that clients can send unauthenticated emails using SMTP.
What must the administrator do to enforce authentication?
While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9:INTERNAL.
Which two statements describe what this policy ID means? (Choose two.)
Refer to the exhibit which shows a command prompt output of a telnet command.
Which configuration change must you make to prevent the banner from displaying the FortiMail serial number?
Refer to the exhibit which displays the domain configuration of a transparent mode FortiMail device.
Based on the exhibit, which two sessions are considered incoming sessions? (Choose two.)