Fortinet NSE6_FML-7.2 Certification Exam Sample Questions and Answers

NSE 6 FortiMail Dumps, NSE6_FML-7.2 Dumps, Fortinet NSE 6 FortiMail PDF, NSE6_FML-7.2 PDF, NSE 6 FortiMail VCE, Fortinet NSE 6 FortiMail Questions PDF, Fortinet Exam VCE, Fortinet NSE6_FML-7.2 VCE, NSE 6 FortiMail Cheat SheetBefore you write the Fortinet NSE 6 FortiMail (NSE6_FML-7.2) certification exam, you may have certain doubts in your mind regarding the pattern of the test, the types of questions asked in it, the difficulty level of the questions and time required to complete the questions. These Fortinet Certified Professional - Public Cloud Security (NSE 6 FortiMail) sample questions and demo exam help you in removing these doubts and prepare you to take the test.

The best approach to pass your Fortinet NSE6_FML-7.2 exam is to challenge and improve your knowledge. To test your learning and identify improvement areas with actual exam format, we suggest you practice with Premium Fortinet NSE6_FML-7.2 Certification Practice Exam. The practice test is one of the most important elements of your Fortinet NSE 6 - FortiMail 7.2 exam study strategy to discover your strengths and weaknesses, to improve your time management skills and to get an idea of the score you can expect.

Fortinet NSE6_FML-7.2 (NSE 6 FortiMail) Sample Questions:

01. What are two benefits of enabling the header manipulation feature?
(Choose two.)
a) It hides internal network information.
b) It reduces overall message size by removing header content.
c) It detects common spamming techniques.
d) It detects spoofed SMTP header addresses.
 
02. Which statement describes the heuristics antispam technique?
a) It analyzes email using characteristics of known spam samples recently caught by FortiMail.
b) The header and body of email messages are scanned against a set of PCRE rules.
c) It analyzes characteristics of images using depth of color, grey level, space, and color change.
d) URIs in the email message body are extracted and sent to third-party rating servers.
 
03. Which two types of remote authentication are supported for FortiMail administrator accounts?
(Choose two.)
a) Single Sign-on
b) TACACS
c) Kerberos
d) RADIUS
 
04. When deploying FortiMail in transparent mode, which of the following statements are true?
(Select all that apply)
a) FortiMail acts as an intermediary for email traffic.
b) Email attachments are automatically encrypted.
c) Transparent mode requires changes to the mail server's IP address.
d) FortiMail's functions are hidden from the email server.
e) Transparent mode is suitable for organizations with complex email infrastructures.
 
05. Which two statements describe the push delivery method used by IBE?
(Choose two.)
a) Decrypted email is displayed using the HTTPS webmail interface.
b) FortiMail generates a notification email message with an embedded HTTPS URL.
c) FortiMail encrypts the email and adds it to a notification email as an HTML attachment.
d) The recipient accesses the HTTPS link and logs in to the FortiMail secure message portal.
 
06. When the domain keys identified mail (DKIM) feature is used, where is the public key stored?
a) The public key is stored in a DNS server as a TXT record.
b) The public key is distributed during the SMTP session establishment.
c) The public key is stored in the local FortiMail flash memory.
d) The public key is stored in a DNS server as a PTR record.
 
07. Which three actions does FortiSandbox perform when it is integrated with FortiMail for advanced threat protection (ATP)?
(Choose three.)
a) It analyzes file and URI objects.
b) It updates FortiGuard databases.
c) It assigns and returns a rating for analyzed objects.
d) It queues email during analysis.
e) It submits objects for sandbox scanning.
 
08. What are two benefits of having authentication reputation tracking enabled on FortiMail?
(Choose two.)
a) Detects spoofed SMTP header addresses
b) Enforces SMTP authentication
c) Tracks offending IP addresses attempting brute force attacks
d) Temporarily locks out an attacker
 
09. Which two statements about how FortiMail behaves when using transparent proxies to process email in transparent mode, are true?
(Choose two.)
a) The inbound proxy supports message queuing and DSNs.
b) FortiMail ignores the destination set by the sender, and uses its own MX record lookup to deliver email.
c) The outbound proxy supports DSNs, but not message queuing.
d) If you disable the transparent proxies, FortiMail will use its built-in MTA to process email.
 
10. Which are FortiMail operating modes?
(Choose three.)
a) Transparent mode
b) Proxy mode
c) NAT/Route mode
d) Server mode
e) Gateway mode

Solutions:

Question: 01

Answer: a, b

Question: 02

Answer: b

Question: 03

Answer: a, d

Question: 04

Answer: a, d

Question: 05

Answer: a, c

Question: 06

Answer: a

Question: 07

Answer: a, b, c

Question: 08

Answer: c, d

Question: 09

Answer: a, d

Question: 10

Answer: a, d, e

Note: If you find any error in these Fortinet NSE 6 - FortiMail 7.2 sample questions, you can update us by write an email on feedback@nwexam.com.

Rating: 5 / 5 (39 votes)