Refer to the exhibit.
Which two statements about email messages sent from User A to User B are correct? (Choose two.)
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks.
What option can the administrator configure to prevent these types of attacks?
Refer to the exhibit.
Which configuration change must you make to block an offending IP address temporarily?
Refer to the exhibit.
What are two expected outcomes if FortiMail applies this antivirus action profile to an email? (Choose two.)
Examine the FortiMail recipient-based policy shown in the exhibit; then answer the question below.
After creating the policy, an administrator discovered that clients are able to send unauthenticated email using SMTP. What must be done to ensure clients cannot send unauthenticated email?
Examine the FortiMail topology and access receive rule shown in the exhibit; then answer the question below.
An administrator must enforce authentication on FML-1 for all outbound email from the example.com domain. Which of the following settings should be used to configure the access receive rule? (Choose two.)
Examine the message column of a log cross search result of an inbound email shown in the exhibit; then answer the question below
Based on logs, which of the following statements are true? (Choose two.)
Examine the FortiMail topology and IP-based policy shown in the exhibit; then answer the question below.
An administrator has enabled the sender reputation feature in the Example_Session profile on FML-1. After a few hours, the deferred queue on the Mail Server started filing up with undeliverable email. What changes should the administrator make to fix this issue? (Choose two.)