01. What are two benefits of enabling the header manipulation feature?
(Choose two.)
a) It hides internal network information.
b) It reduces overall message size by removing header content.
c) It detects common spamming techniques.
d) It detects spoofed SMTP header addresses.
02. Which statement describes the heuristics antispam technique?
a) It analyzes email using characteristics of known spam samples recently caught by FortiMail.
b) The header and body of email messages are scanned against a set of PCRE rules.
c) It analyzes characteristics of images using depth of color, grey level, space, and color change.
d) URIs in the email message body are extracted and sent to third-party rating servers.
03. Which two types of remote authentication are supported for FortiMail administrator accounts?
(Choose two.)
a) Single Sign-on
b) TACACS
c) Kerberos
d) RADIUS
04. When deploying FortiMail in transparent mode, which of the following statements are true?
(Select all that apply)
a) FortiMail acts as an intermediary for email traffic.
b) Email attachments are automatically encrypted.
c) Transparent mode requires changes to the mail server's IP address.
d) FortiMail's functions are hidden from the email server.
e) Transparent mode is suitable for organizations with complex email infrastructures.
05. Which two statements describe the push delivery method used by IBE?
(Choose two.)
a) Decrypted email is displayed using the HTTPS webmail interface.
b) FortiMail generates a notification email message with an embedded HTTPS URL.
c) FortiMail encrypts the email and adds it to a notification email as an HTML attachment.
d) The recipient accesses the HTTPS link and logs in to the FortiMail secure message portal.
06. When the domain keys identified mail (DKIM) feature is used, where is the public key stored?
a) The public key is stored in a DNS server as a TXT record.
b) The public key is distributed during the SMTP session establishment.
c) The public key is stored in the local FortiMail flash memory.
d) The public key is stored in a DNS server as a PTR record.
07. Which three actions does FortiSandbox perform when it is integrated with FortiMail for advanced threat protection (ATP)?
(Choose three.)
a) It analyzes file and URI objects.
b) It updates FortiGuard databases.
c) It assigns and returns a rating for analyzed objects.
d) It queues email during analysis.
e) It submits objects for sandbox scanning.
08. What are two benefits of having authentication reputation tracking enabled on FortiMail?
(Choose two.)
a) Detects spoofed SMTP header addresses
b) Enforces SMTP authentication
c) Tracks offending IP addresses attempting brute force attacks
d) Temporarily locks out an attacker
09. Which two statements about how FortiMail behaves when using transparent proxies to process email in transparent mode, are true?
(Choose two.)
a) The inbound proxy supports message queuing and DSNs.
b) FortiMail ignores the destination set by the sender, and uses its own MX record lookup to deliver email.
c) The outbound proxy supports DSNs, but not message queuing.
d) If you disable the transparent proxies, FortiMail will use its built-in MTA to process email.
10. Which are FortiMail operating modes?
(Choose three.)
a) Transparent mode
b) Proxy mode
c) NAT/Route mode
d) Server mode
e) Gateway mode