Which two FortiMail antispam techniques can you use to combat zero-day spam? (Choose two.)
Answer : A, B
Refer to the exhibits showing SMTP limits (Session Profile --- SMTP Limits), and domain settings (Domain Settings, and Domain Settings --- Other) of a FortiMail device.



Which message size limit in KB will the FortiMail apply to outbound email?
Answer : D
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks. What option can the administrator configure to prevent these types of attacks?
Answer : A
While reviewing logs, an administrator discovers that an incoming email was processed using policy IDs 0:4:9:INTERNAL.
Which two statements describe what this policy ID means? (Choose two.)
Answer : A, C
A FortiMail device is configured with the protected domain example.com.
If none of the senders is authenticated, which two envelope addresses will require an access receive rule? (Choose two.)
Answer : A, B
An organization has different groups of users with different needs in email functionality, such as address book access, mobile device access, email retention periods, and disk quotas.
Which FortiMail feature specific to server mode can be used to accomplish this?
Answer : A
Refer to the exhibit which displays the domain configuration of a transparent mode FortiMail device.

Based on the exhibit, which two sessions are considered incoming sessions? (Choose two.)
Answer : A, D