Fortinet Related Exams
NSE6_FML-6.4 Exam
Refer to the exhibit.
Which two statements about email messages sent from User A to User B are correct? (Choose two.)
A FortiMail administrator is concerned about cyber criminals attempting to get sensitive information from employees using whaling phishing attacks.
What option can the administrator configure to prevent these types of attacks?
Examine the message column of a log cross search result of an inbound email shown in the exhibit; then answer the question below
Based on logs, which of the following statements are true? (Choose two.)