Examine the access receive rule shown in the exhibit; then answer the question below.
Which of the following statements are true? (Choose two.)
Answer : C, D
Examine the message column of a log cross search result of an inbound email shown in the exhibit; then answer the question below
Based on logs, which of the following statements are true? (Choose two.)
Answer : A, C
Which firmware upgrade method for an active-passive HA cluster ensures service outage is minimal, and there are no unnecessary failovers?
Answer : B
Which two antispam techniques query FortiGuard for rating information? (Choose two.)
Answer : A, B
A FortiMail administrator is investigating a sudden increase in DSNs being delivered to the protected domain for undeliverable email messages. After searching the logs, the administrator identifies that the DSNs were not generated as a result of any outbound email sent from the protected domain.
Which FortiMail antispam technique can the administrator use to prevent this scenario?
Answer : A
Refer to the exhibit.
Which statement describes the impact of setting the User inactivity expiry time option to 90 days?
Answer : A
FortiMail is configured with the protected domain example.com.
Which two envelope addresses will require an access receive rule, to relay for unauthenticated senders? (Choose two.)
Answer : B, D